0704-883-0675     |      dataprojectng@gmail.com

Investigation into the Security of IoT Devices in University Campuses: A Case Study of Modibbo Adama University, Yola (Yola North LGA, Adamawa State)

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
The integration of Internet of Things (IoT) devices into university campuses has seen rapid growth, bringing with it numerous benefits such as improved campus security, automated attendance systems, energy management, and student engagement. Modibbo Adama University, Yola, is no exception in utilizing IoT devices to enhance operational efficiency and improve the student and staff experience. However, with the increasing number of connected devices, security concerns have become a significant challenge. IoT devices, often lacking sufficient security protocols, are vulnerable to various cyber threats such as unauthorized access, data breaches, and denial-of-service attacks. These vulnerabilities can lead to severe consequences, including the exposure of sensitive information, disruption of campus operations, and damage to the university's reputation. This study seeks to investigate the security of IoT devices deployed across Modibbo Adama University, Yola, and assess the potential risks they pose to the university’s infrastructure.

Statement of the Problem
Modibbo Adama University, Yola, has embraced the use of IoT devices for various applications within the campus environment. However, these devices often lack robust security mechanisms, making them prone to cyberattacks. As a result, the university's network and sensitive data may be at risk. Existing security protocols may not be sufficient to safeguard the university’s IoT systems from potential vulnerabilities, raising concerns over unauthorized access and the integrity of IoT-based services. There is a need to explore the security risks associated with IoT devices and propose measures to strengthen their protection within the campus environment.

Objectives of the Study

  1. To investigate the security vulnerabilities of IoT devices in use at Modibbo Adama University, Yola.
  2. To evaluate the effectiveness of existing security protocols protecting IoT devices on campus.
  3. To propose enhanced security strategies for securing IoT devices in university settings.

Research Questions

  1. What are the common security vulnerabilities present in IoT devices at Modibbo Adama University, Yola?
  2. How effective are the current security measures in preventing cyber threats to IoT devices on campus?
  3. What strategies can be implemented to enhance the security of IoT devices in university environments?

Research Hypotheses

  1. IoT devices in use at Modibbo Adama University, Yola, exhibit significant security vulnerabilities.
  2. Current security protocols are not sufficiently effective in mitigating the risks associated with IoT devices on campus.
  3. Implementing enhanced security strategies will significantly reduce the vulnerabilities of IoT devices on campus.

Significance of the Study
This study will provide valuable insights into the security challenges associated with IoT devices on university campuses. By identifying vulnerabilities and evaluating existing security measures, the research will guide Modibbo Adama University in adopting more secure IoT protocols, ultimately enhancing the protection of campus infrastructure and sensitive information.

Scope and Limitations of the Study
The study will focus on investigating the security of IoT devices in use at Modibbo Adama University, Yola (Yola North LGA, Adamawa State). It will examine security vulnerabilities, the effectiveness of current protocols, and recommend solutions for improving security. Limitations include potential resistance to security assessments and challenges in gaining full access to university IoT systems for testing.

Definitions of Terms
IoT Devices: Physical devices connected to the internet that can collect and exchange data, such as smart sensors, security cameras, and attendance systems.
Cybersecurity: The protection of systems, networks, and data from digital attacks, theft, or damage.
Vulnerabilities: Weaknesses in a system that can be exploited by attackers to gain unauthorized access or cause damage.





Related Project Materials

An Investigation of Nurses' Awareness and Adherence to Protocols for the Safe Handling of Hazardous Drugs at Taraba State Specialist Hospital

Background of the Study

Hazardous drugs, including chemotherapy agents, immunosuppressants, and antiretroviral medications, pose signific...

Read more
An examination of rural banking strategies for agricultural risk mitigation: a case study of Accord Microfinance Bank

Background of the Study

Effective risk mitigation is essential for the sustainability of agricultural finance, particularly in rural area...

Read more
DOMESTIC VIOLENCE AND IT EFFECT ON NATIONAL SECURITY

Abstract

Domestic violence and it effect on national security which is any act of gender-based violence that results in...

Read more
An Investigation of the Impact of Digital Learning Platforms on Educational Outcomes in Nigeria

Background of the Study
The rapid digital transformation of the education sector has led to an increased...

Read more
Evaluation of Cloud-Based Identity Management Systems for Universities: A Case Study of Federal Polytechnic, Bauchi (Bauchi LGA, Bauchi State)

Background of the Study
As universities increasingly adopt digital platforms for academic and administrative purposes, managing user identit...

Read more
The impact of technology adoption on productivity in Nigeria’s manufacturing sector: An evaluation of policies in Lagos State (2000–2020).

Background of the Study:

Technological advancements have become the cornerstone of productivity enhancement in modern manufacturing secto...

Read more
An Examination of Phonetic Patterns in Nigerian Traditional Ceremonies: A Study of Yoruba Chants

Background of the Study
Yoruba chants, integral to Nigerian traditional ceremonies, embody a rich tapestry of phonetic pat...

Read more
ORGANIZATION AND FINANCING OF PRIMARY HEALTH CARE IN NIGERIA: PROBLEMS, ISSUES AND ALTERNATIVE APPROACHES

ABSTRACT

The way a country finances its health care system is a critical determinant for reaching unive...

Read more
An Evaluation of Rural Community Inclusion in Local Government Decision-Making: The Case of Sokoto South Local Government, Sokoto State

Chapter One: Introduction

1.1 Background of the Study
Rural communities in Nigeria often experie...

Read more
THE AVAILABILITY AND UTILIZATION OF SCHOOL LIBRARY RESOURCES AND ACADEMIC PERFORMANCE IN SELECTED SECONDARY SCHOOLS IN ETHIOPE EAST LOCAL GOVERNMENT, DELTA STATE

ABSTRACT

This study was carried out to examine the availability and utilization of school library resources and academic...

Read more
Share this page with your friends




whatsapp