Background of the Study
With the increasing reliance on online platforms for educational transactions, such as tuition payments, grade access, and course registrations, the security of these digital transactions has become a critical concern (Chen et al., 2023). Cryptographic algorithms, such as RSA, AES, and elliptic curve cryptography, play a crucial role in securing online communication and ensuring the confidentiality, integrity, and authenticity of digital transactions (Zhang & Li, 2024). The University of Jos, located in Jos North LGA, Plateau State, handles various online transactions that require a secure infrastructure to protect sensitive information from cyber-attacks. The implementation of cryptographic algorithms tailored for the university’s specific needs can significantly enhance security and minimize the risks of fraud or data breaches.
Statement of the Problem
The University of Jos faces challenges related to the security of its online transactions, particularly in ensuring the safety of student financial transactions, academic records, and personal data. Given the rise in cyber threats, traditional security measures may no longer be sufficient to protect the integrity of these systems. The adoption of advanced cryptographic algorithms to secure online transactions is necessary to protect sensitive data and foster trust among students and staff.
Objectives of the Study
Research Questions
Research Hypotheses
Significance of the Study
This study will contribute to improving the security infrastructure at the University of Jos by implementing cryptographic algorithms for securing online transactions. It will enhance the reliability of the university’s online systems, increase user confidence, and reduce the risk of cyber-attacks, benefiting students, staff, and the institution as a whole.
Scope and Limitations of the Study
The study will focus on the implementation of cryptographic algorithms to secure online transactions within the University of Jos, specifically in the Jos North LGA. The study will not address other types of security measures for offline transactions or other university services outside the scope of online transaction systems.
Definitions of Terms
Cryptographic Algorithms: Mathematical procedures used to encrypt and decrypt data, ensuring the confidentiality and security of digital information.
RSA and AES: Common cryptographic algorithms used for securing data in communication systems.
Cybersecurity: Measures taken to protect digital information systems from unauthorized access, attacks, and data breaches.
ABSTRACT
The purpose of this study was to find out the perception of students of the introduction of sex education i...
ABSTRACT: This study investigates the role of vocational education in addressing industry demand for specialized skills, focusing on aligning...
Background of the Study
Corporate governance refers to the system of rules, practices, and processes by which companies are...
Background of the Study
Medical tourism involves individuals traveling abroad to receive medical treatments that may be unavailable or mo...
Background of the study
Intonation, the variation of pitch in speech, plays a pivotal role in enhancing persuasive communication, especia...
ABSTRACT
Different school environments contribute to poor performance in the schools in this area and necessitated the...
Background of the Study
Teacher burnout is a significant issue in the field of special education, where the demands on educators are o...
THE ROLE OF CUSTOMER ANALYTICS IN UNDERSTANDING CUSTOMER NEEDS
This study explored the role of customer analytics in und...
Background of the Study
Hausa and Fulani have shared a long history of linguistic and cultural contact in...
Background of the Study
Ethics training programs are designed to instill ethical values, enhance decision-making capabil...