Show simple item record

dc.contributor.advisorMaharaj, Manoj Sewak.
dc.contributor.advisorAjayi, Nurudeen Abimbola.
dc.creatorBadamasi, Bukhari.
dc.date.accessioned2020-04-21T12:10:39Z
dc.date.available2020-04-21T12:10:39Z
dc.date.created2018
dc.date.issued2018
dc.identifier.urihttps://researchspace.ukzn.ac.za/handle/10413/18191
dc.descriptionMasters Degree. University of KwaZulu-Natal, Durban.en_US
dc.description.abstractThe use of Information Communication Technology (ICT) within the educational sector is increasing rapidly. University systems are becoming increasingly dependent on computerized information systems (CIS) in order to carry out their daily routine. Moreover, CIS no longer process staff records and financial data only, as they once did. Nowadays, universities use CIS to assist in automating the overall system. This automation includes the use of multiple databases, data detail periodicity (i.e. gender, race/ethnicity, enrollment, degrees granted, and program major), record identification (e.g. social security number ‘SSN’), linking to other databases (i.e. linking unit record data with external databases such as university and employment data). The increasing demand and exposure to Internet resources and infrastructure by individuals and universities have made IT infrastructure easy targets for cybercriminals who employ sophisticated attacks such as Advanced Persistent Threats, Distributed Denial of Service attacks and Botnets in order to steal confidential data, identities of individuals and money. Hence, in order to stay in business, universities realise that it is imperative to secure vital Information Systems from easily being exploited by emerging and existing forms of cybercrimes. This study was conducted to determine and evaluate the various forms of cybercrimes and their consequences on the university network at Ahmadu Bello University, Zaria. The study was also aimed at proposing means of mitigating cybercrimes and their effects on the university network. Hence, an exploratory research design supported by qualitative research approach was used in this study. Staff of the Institute of Computing, Information and Communication technology (ICICT) were interviewed. The findings of the study present different security measures, and security tools that can be used to effectively mitigate cybercrimes. It was found that social engineering, denial of service attacks, website defacement were among the types of cybercrimes occurring on the university network. It is therefore recommended that behavioural approach in a form of motivation of staff behaviour, salary increases, and cash incentive to reduce cybercrime perpetrated by these staff.en_US
dc.language.isoenen_US
dc.subject.otherSecurity protocols.en_US
dc.subject.otherCybercrime.en_US
dc.subject.otherAhmadu Bello University.en_US
dc.subject.otherZaria.en_US
dc.subject.otherNigeria.en_US
dc.titleThe effects of security protocols on cybercrime at Ahmadu Bello University, Zaria, Nigeria.en_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record