Background of the Study
The traditional security model based on perimeter defenses is no longer sufficient to protect modern networks against evolving cyber threats. The Zero-Trust Network model shifts away from assuming trust based on location and requires continuous authentication and authorization for every device and user, regardless of their location within or outside the network. This model operates under the principle of “never trust, always verify.” By implementing a Zero-Trust model, Federal University, Dutsin-Ma can ensure that all access requests are authenticated and validated, reducing the likelihood of internal and external threats. This approach is especially crucial for academic institutions where sensitive data and resources need to be constantly protected. This study aims to explore the implementation of a Zero-Trust Network model to strengthen the university's network security.
Statement of the Problem
Federal University, Dutsin-Ma, Katsina State, faces significant security challenges due to the increasing number of devices and users accessing its network, coupled with the growing sophistication of cyber-attacks. The university's current network security infrastructure, based on perimeter defenses, is not equipped to handle advanced persistent threats (APTs) and internal security breaches. A Zero-Trust model, which eliminates the concept of trust based solely on network location, could provide an additional layer of security by continuously verifying user and device identities. However, the implementation of this model has not yet been explored at the university level. This study aims to investigate how the Zero-Trust model can be effectively implemented in the university's network to enhance security.
Objectives of the Study
To explore the current security challenges faced by Federal University, Dutsin-Ma, Katsina State.
To design and implement a Zero-Trust Network model tailored to the university’s network infrastructure.
To assess the impact of the Zero-Trust Network model on the overall security posture of Federal University, Dutsin-Ma.
Research Questions
What are the main security risks and vulnerabilities faced by Federal University, Dutsin-Ma, in its current network setup?
How can a Zero-Trust Network model be implemented within the existing infrastructure of Federal University, Dutsin-Ma?
What improvements in network security can be achieved through the implementation of a Zero-Trust Network model at the university?
Scope and Limitations of the Study
This study will focus on the implementation and evaluation of a Zero-Trust Network model within the campus network of Federal University, Dutsin-Ma. It will not cover the broader adoption of Zero-Trust for external or private sector applications. Limitations include the challenges associated with implementing a Zero-Trust model within the university’s existing infrastructure, particularly due to potential resource and compatibility issues.
Definitions of Terms
Zero-Trust Network Model: A security model that assumes no device or user can be trusted by default, regardless of their location, and requires continuous verification.
Access Control: The process of granting or denying access to network resources based on user authentication and authorization.
Advanced Persistent Threat (APT): A sophisticated and targeted cyber-attack that is designed to breach security defenses over a prolonged period.
Background of the Study
Land-use policies play a critical role in shaping agricultural development and expansion, partic...
Abstract: This study explores the impact of adult education on global competitiveness, examining how adult learning initiatives contribute to...
Abstract
The industrial sector remains a strong sector of any economy, be it developed or developing. T...
Abstract
Terrorists have recourse to violence against the proprietors of the monopoly on the legitimate...
Background of the study
Digital consent practices are fundamental to ensuring that consumers have control over the...
PUBLIC SECTOR FINANCIAL REPORTING STANDARDS AND THEIR APPLICATION IN LOCAL GOVERNMENT AREAS
The objectives of this resea...
Background of the Study
Behavioral economics examines how psychological factors and cognitive biases influence economic dec...
Background of the Study:
Customer loyalty programs have emerged as a key strategy in the retail banking sector for fostering long-term re...
ABSTRACT
T-junction traffic light controller is such a device that will play a significant role in controlling traffic at junctions, to e...
Background of the Study:
Access to healthcare is universally recognized as a fundamental human right, as outlined in the Un...