0704-883-0675     |      dataprojectng@gmail.com

Evaluation of Cloud-Based Cybersecurity Threat Management Systems in Federal University, Lafia, Nasarawa State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
As universities increasingly migrate their data and services to the cloud, the need for robust cybersecurity measures to protect cloud-based assets becomes more critical. Federal University Lafia in Nasarawa State is among the universities leveraging cloud technologies to improve access to resources and enhance collaboration. While cloud computing offers numerous benefits such as scalability, flexibility, and cost savings, it also introduces new security challenges, particularly in threat detection and management. Without appropriate security protocols and monitoring systems, universities may become targets of cyberattacks that compromise sensitive data.

Cloud-based cybersecurity threat management systems offer a promising solution by providing real-time monitoring, automated threat detection, and rapid response capabilities. These systems can aggregate and analyze vast amounts of data from various cloud services, identify potential security threats, and trigger appropriate security responses. However, the effectiveness of cloud-based cybersecurity threat management systems in protecting university cloud infrastructures remains underexplored in Nigeria. This study aims to evaluate the use of such systems at Federal University Lafia and assess their ability to detect and mitigate cyber threats.

Statement of the Problem
Federal University Lafia has adopted cloud-based services for various academic and administrative functions, but the university faces growing concerns about the security of its cloud infrastructure. The lack of comprehensive cybersecurity threat management systems to monitor and respond to potential attacks exposes the university’s cloud services to significant risks. As such, there is a need to evaluate the effectiveness of cloud-based cybersecurity threat management systems in ensuring the security of the university’s cloud-based assets.

Objectives of the Study

  1. To evaluate the effectiveness of cloud-based cybersecurity threat management systems at Federal University Lafia.

  2. To assess the performance of cloud-based threat detection and response mechanisms in the university's cloud infrastructure.

  3. To propose recommendations for improving the security of cloud-based services at Federal University Lafia.

Research Questions

  1. How effective are cloud-based cybersecurity threat management systems in protecting the cloud infrastructure at Federal University Lafia?

  2. What are the strengths and limitations of using cloud-based systems for cybersecurity threat management in a university setting?

  3. How do cloud-based threat management systems compare to traditional on-premises security solutions in detecting and mitigating cyber threats?

Significance of the Study
This study will provide valuable insights into the effectiveness of cloud-based cybersecurity threat management systems in Nigerian universities. By evaluating the security posture of Federal University Lafia’s cloud infrastructure, the research will contribute to improving the overall cybersecurity framework at the institution and potentially offer a model for other universities in Nigeria seeking to enhance their cloud security.

Scope and Limitations of the Study
The study will focus on the evaluation of cloud-based cybersecurity threat management systems at Federal University Lafia. The research will specifically examine how well these systems perform in terms of detecting and mitigating cyber threats. Limitations include the potential difficulty in accessing data on actual threat incidents and the reliance on the university's existing cloud infrastructure for evaluation.

Definitions of Terms

  • Cloud Computing: The delivery of computing services such as storage, processing, and networking over the internet, typically on a pay-per-use basis.

  • Cybersecurity Threat Management: The process of identifying, assessing, and mitigating cybersecurity risks to protect systems and data.

  • Cloud Security: The set of policies, technologies, and controls designed to protect cloud-based systems, data, and infrastructure.

  • Threat Detection: The process of identifying potential cybersecurity threats in real-time through analysis of network or system activities.





Related Project Materials

An examination of post-conflict peacebuilding efforts in Southern Kaduna, Kaduna State

Chapter One: Introduction

1.1 Background of the Study
Southern Kaduna has been plagued by recurr...

Read more
An examination of the effectiveness of government STEM grants in Keana LGA, Nasarawa State

Background of the Study
Government grants for STEM education are designed to bridge funding gaps, enhance infrastructure,...

Read more
The Role of Auditors in Enhancing Budget Execution Monitoring in Rural Development Programs

Background of the Study

Rural development programs are essential for promoting socio-economic growth in rural areas. Eff...

Read more
An assessment of the role of technology in enhancing Igbo interpreting services in academic conferences

Background of the study
Academic conferences serve as vital platforms for disseminating research and fost...

Read more
The impact of sports mentorship programs on students' career aspirations in Makurdi Local Government Area, Benue State

Background of the study

In Makurdi Local Government Area, Benue State, sports mentorship programs have emerged as a vital mechanism for i...

Read more
THE USE OF QUALITY CONTROL PARAMETERS IN THE EVALUATION OF VEGETABLE CRUDE DRUGS  

ABSTRACT

Medicinal plants constitute a source of raw material for both traditional system of medicine and modern medicin...

Read more
PERSONALITY AS A DETERMINANT OF INNOVATIVE BEHAVIOUR IN THE WORKPLACE

ABSTRACT

This dissertation explores Personality traits as a determinant of Innovative behaviour in the workplace. The re...

Read more
Cost-Benefit Analysis as a Tool for Decision-Making in Keffi LGA

Background of the Study

Cost-Benefit Analysis (CBA) is a systematic approach to evalua...

Read more
An Appraisal of the Contribution of Retail Banking to Economic Growth: A Case Study of First Bank, Niger State

Background of the Study
Retail banking plays an integral role in driving economic growth by providing critical financial se...

Read more
IMPACTS OF GENDER ON THE ACADEMIC ACHIEVEMENT OF SOCIAL STUDIES JSS II STUDENTS IN PUBLIC SECONDARY SCHOOLS IN JOS NORTH LOCAL GOVERNMENT OF PLATEAU STATE

ABSTRACT

This study investigates the impacts of gender on the academic achievement of Socia...

Read more
Share this page with your friends




whatsapp