0704-883-0675     |      dataprojectng@gmail.com

Investigation into the Security of IoT Devices in University Campuses: A Case Study of Modibbo Adama University, Yola (Yola North LGA, Adamawa State)

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
The integration of Internet of Things (IoT) devices into university campuses has seen rapid growth, bringing with it numerous benefits such as improved campus security, automated attendance systems, energy management, and student engagement. Modibbo Adama University, Yola, is no exception in utilizing IoT devices to enhance operational efficiency and improve the student and staff experience. However, with the increasing number of connected devices, security concerns have become a significant challenge. IoT devices, often lacking sufficient security protocols, are vulnerable to various cyber threats such as unauthorized access, data breaches, and denial-of-service attacks. These vulnerabilities can lead to severe consequences, including the exposure of sensitive information, disruption of campus operations, and damage to the university's reputation. This study seeks to investigate the security of IoT devices deployed across Modibbo Adama University, Yola, and assess the potential risks they pose to the university’s infrastructure.

Statement of the Problem
Modibbo Adama University, Yola, has embraced the use of IoT devices for various applications within the campus environment. However, these devices often lack robust security mechanisms, making them prone to cyberattacks. As a result, the university's network and sensitive data may be at risk. Existing security protocols may not be sufficient to safeguard the university’s IoT systems from potential vulnerabilities, raising concerns over unauthorized access and the integrity of IoT-based services. There is a need to explore the security risks associated with IoT devices and propose measures to strengthen their protection within the campus environment.

Objectives of the Study

  1. To investigate the security vulnerabilities of IoT devices in use at Modibbo Adama University, Yola.
  2. To evaluate the effectiveness of existing security protocols protecting IoT devices on campus.
  3. To propose enhanced security strategies for securing IoT devices in university settings.

Research Questions

  1. What are the common security vulnerabilities present in IoT devices at Modibbo Adama University, Yola?
  2. How effective are the current security measures in preventing cyber threats to IoT devices on campus?
  3. What strategies can be implemented to enhance the security of IoT devices in university environments?

Research Hypotheses

  1. IoT devices in use at Modibbo Adama University, Yola, exhibit significant security vulnerabilities.
  2. Current security protocols are not sufficiently effective in mitigating the risks associated with IoT devices on campus.
  3. Implementing enhanced security strategies will significantly reduce the vulnerabilities of IoT devices on campus.

Significance of the Study
This study will provide valuable insights into the security challenges associated with IoT devices on university campuses. By identifying vulnerabilities and evaluating existing security measures, the research will guide Modibbo Adama University in adopting more secure IoT protocols, ultimately enhancing the protection of campus infrastructure and sensitive information.

Scope and Limitations of the Study
The study will focus on investigating the security of IoT devices in use at Modibbo Adama University, Yola (Yola North LGA, Adamawa State). It will examine security vulnerabilities, the effectiveness of current protocols, and recommend solutions for improving security. Limitations include potential resistance to security assessments and challenges in gaining full access to university IoT systems for testing.

Definitions of Terms
IoT Devices: Physical devices connected to the internet that can collect and exchange data, such as smart sensors, security cameras, and attendance systems.
Cybersecurity: The protection of systems, networks, and data from digital attacks, theft, or damage.
Vulnerabilities: Weaknesses in a system that can be exploited by attackers to gain unauthorized access or cause damage.





Related Project Materials

The role of industrial clusters in promoting entrepreneurship: A case study of small-scale enterprises in Aba, Abia State

Background of the Study
Industrial clusters have become vital catalysts for entrepreneurship by fostering close interactio...

Read more
The Psychological Effects of Long-Term Hospitalization on Psychiatric Patients: A Case Study of Neuropsychiatric Hospital, Calabar, Cross River State

Background of the Study

Long-term hospitalization for psychiatric patients is a trea...

Read more
AN ANALYSIS OF UNITED NATIONS CONVENTIONS ON PREVENTION AND CONTROL OF NARCOTIC DRUGS AND PSYCHOTROPIC SUBSTANCES: A CASE STUDY OF DOMESTIC IMPLEMENTATION IN NIGERIA

ABSTRACT

Narcotic drugs and Psychotropic substances are illicit drugs regulated under international law. They are harmful and they cause...

Read more
The Impact of Government Environmental Initiatives on Economic Development in Nigeria

Background of the Study
Government environmental initiatives are pivotal in steering a nation toward sustainable developme...

Read more
ANALYSIS OF IPOB AGITATION AND THE NEED FOR NATIONAL RESTRUCTURING IN NIGERIA

ABSTRACT

This study was carried out on the  analysis of ipob agitation and the need for national r...

Read more
The Impact of Customer Relationship Management System Upgrades on Enhancing Loyalty in Banking: A Case Study of Sterling Bank

Background of the Study
In an era defined by heightened competition and rapidly evolving customer expectations, banks are i...

Read more
An evaluation of conditional cash transfers in improving maternal health in Kaduna State

Background of the Study:
Conditional cash transfers (CCTs) are financial incentives provided to low-income households conti...

Read more
EFFECT OF SPLIT ATTENTION MULTIMEDIA PRINCIPLE AND COGNITIVE LOAD ON SENIOR SECONDARY SCHOOL STUDENTS’ RETENTION IN QUANTUM PHYSICS IN OGUN STATE NIGERIA

ABSTRACT

The use of multimedia instructions during teaching and learning of quantum physics is becoming popular to overcome the abstract...

Read more
ASSESSSMENT OF THE LEVELS OF CULTURAL COMPETENCE AMONG EARLY CHILDHOOD EDUCATORS AND ITS IMPACT ON EDUCATIONAL OUTCOMES FOR CULTURALLY DIVERSE CHILDREN

Abstract: This research explores the levels of cultural competence among early childhood educators and its impact...

Read more
Assessing the Role of Coordinated Fiscal Reforms in Enhancing Public Investment Efficiency in Nigeria

Background of the Study:
Coordinated fiscal reforms have been implemented in Nigeria with the objective of improving the ef...

Read more
Share this page with your friends




whatsapp