Background of the Study
Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. According to recent studies, insider threats are responsible for a substantial portion of data breaches and network security incidents (Wang et al., 2024). In a university setting, where academic data, research, and personal information are stored and exchanged, the potential for damage is immense. Federal University, Wukari, Taraba State, like many higher education institutions, faces the challenge of protecting its network from both intentional and unintentional insider threats.
Despite efforts to safeguard network infrastructure, the dynamic nature of university environments, with multiple stakeholders including students, faculty, and staff, creates vulnerabilities. Insider threats often stem from a lack of awareness, inadequate access controls, or disgruntled employees who intentionally exploit their access to systems for personal gain. Understanding the nature of these threats and developing appropriate network security measures are essential to protect the integrity and confidentiality of the university’s data. This study seeks to analyze the current network security posture at Federal University, Wukari, in relation to insider threats and suggest measures to mitigate such risks.
Statement of the Problem
While Federal University, Wukari, has implemented several security measures to protect its network, the risks associated with insider threats remain inadequately addressed. Insiders with legitimate access to sensitive data may unintentionally or intentionally compromise the security of the network, leading to data breaches, theft, or system misuse. This study aims to investigate the effectiveness of current network security measures and propose solutions to better protect the university from insider threats.
Objectives of the Study
To assess the current network security measures in place at Federal University, Wukari, and identify vulnerabilities to insider threats.
To analyze the role of insider threats in compromising network security within the university.
To propose and evaluate strategies for mitigating insider threats and strengthening network security.
Research Questions
What are the primary insider threats that affect network security at Federal University, Wukari?
How effective are the current network security measures in mitigating insider threats?
What strategies can be implemented to reduce the risk of insider threats within the university’s network?
Significance of the Study
This study will provide Federal University, Wukari, with valuable insights into the nature of insider threats and help identify vulnerabilities in its existing security measures. By implementing the recommendations derived from the study, the university can better safeguard its network and sensitive data, reducing the potential for costly security breaches.
Scope and Limitations of the Study
The study is limited to an analysis of insider threats and network security measures at Federal University, Wukari. It will focus on data security, access controls, and threat monitoring systems, but will not extend to other areas of campus cybersecurity such as physical security or social engineering attacks. The research will only cover the university’s administrative network and not external collaborations or third-party services.
Definitions of Terms
Insider Threats: Threats to network security posed by individuals within the organization, such as employees or students, who exploit their access to sensitive information.
Network Security Measures: Tools, policies, and practices designed to protect network infrastructure and sensitive data from cyberattacks or unauthorized access.
Access Control: Mechanisms used to regulate who can access specific resources in a network.
Background of the Study:
School location is a critical determinant of academic performance, influencing access to quality e...
Background of the Study
Digital media has become a cornerstone of contemporary political campaigning, with political adv...
Background of the study:
Interactive ad formats engage consumers through dynamic elements such as games, quizzes, and augmented reality, enh...
ABSTRACT
The utmost aim of this study is to clearly define the factors necessary for the design of an e...
Infection control measures are crucial in healthcare settings to prevent the...
Background of the Study
Fiscal deficits occur when government expenditures exceed revenues, and their management is critic...
Abstract: This study examines the impact of adult education on elderly populations, focusing on how educational programs tailored for older ad...
Background of the Study:
Teacher absenteeism has emerged as a critical issue in the educational sector, particularly in reg...
Background of the Study
Mentorship programs are a widely recognized strategy for fostering career development and professional growth, es...
Background of the Study
Rural development programs aim to improve the living standards of communities i...