Background of the Study
The increasing demand for remote access to university resources has led to the widespread implementation of remote access security protocols. These protocols are essential for ensuring that students, faculty, and administrative staff can securely access the university network from off-campus locations. However, remote access introduces security risks, including unauthorized access, data breaches, and cyber-attacks. Federal University, Birnin Kebbi, has adopted remote access mechanisms to facilitate online learning, research collaboration, and administrative functions. However, the effectiveness of these security protocols in preventing cyber threats remains uncertain. The purpose of this study is to evaluate the security protocols used for remote access at the university, identify vulnerabilities, and recommend improvements.
Statement of the Problem
Federal University, Birnin Kebbi, has implemented various remote access security measures, including Virtual Private Networks (VPNs) and multi-factor authentication (MFA). However, the effectiveness of these measures in preventing unauthorized access and cyber threats has not been fully assessed. There are concerns about the security of login credentials, potential vulnerabilities in remote desktop protocols, and susceptibility to phishing attacks. Additionally, inadequate monitoring of remote access activities may expose the university to cyber risks. This study aims to evaluate the university’s remote access security protocols and recommend enhancements to ensure a more secure remote access environment.
Objectives of the Study
To assess the current remote access security protocols implemented at Federal University, Birnin Kebbi.
To identify vulnerabilities in the existing remote access security framework.
To propose enhanced security measures to improve remote access security at the university.
Research Questions
What are the remote access security protocols currently in use at Federal University, Birnin Kebbi?
What vulnerabilities exist within the university’s remote access security framework?
What measures can be implemented to strengthen remote access security at the university?
Scope and Limitations of the Study
The study will focus on evaluating the remote access security protocols at Federal University, Birnin Kebbi, Kebbi State. It will not cover remote access security in other institutions or private organizations. Limitations include potential restrictions in accessing classified security policies and real-time attack data.
Definitions of Terms
Remote Access: The ability to connect to a network from an off-campus or distant location.
Virtual Private Network (VPN): A security technology that encrypts internet traffic and masks a user’s IP address to ensure secure remote access.
Multi-Factor Authentication (MFA): A security mechanism that requires multiple verification factors to authenticate a user’s identity.
Chapter One: Introduction
1.1 Background of the Study...
Background of the Study
Corporate culture plays a significant role in shaping employee...
Background of the Study:
Healthcare worker shortages are a critical issue affecting service delivery in many regions, inclu...
Chapter One: Introduction
1.1 Background of the Study
Socia...
INTRODUCTION
Since the discovery of electrical energy for illumination, it is evident that human interactio...
Background of the Study
Chemotherapy administration is a critical component of cancer treatment, requiring strict adherence to establishe...
Background of the Study :
Fiscal consolidation refers to policies aimed at reducing government deficits and debt accumulation through spe...
Background of the study
In recent years, the role of secretaries within organizations has undergone sig...
Background of the Study:
The shift to online learning in recent years has brought significant changes to the educational landscape, parti...
BACKGROUND OF THE STUDY
Right from the start of its existence, the nation that is now known as Nigeria was established...