• Login
    View Item 
    •   ResearchSpace Home
    • College of Law and Management Studies
    • School of Management, IT and Governance
    • Information Systems and Technology
    • Masters Degrees (Information Systems and Technology)
    • View Item
    •   ResearchSpace Home
    • College of Law and Management Studies
    • School of Management, IT and Governance
    • Information Systems and Technology
    • Masters Degrees (Information Systems and Technology)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    The effects of security protocols on cybercrime at Ahmadu Bello University, Zaria, Nigeria.

    Thumbnail
    View/Open
    Badamasi_Bukhari_2018.pdf (1.489Mb)
    Date
    2018
    Author
    Badamasi, Bukhari.
    Metadata
    Show full item record
    Abstract
    The use of Information Communication Technology (ICT) within the educational sector is increasing rapidly. University systems are becoming increasingly dependent on computerized information systems (CIS) in order to carry out their daily routine. Moreover, CIS no longer process staff records and financial data only, as they once did. Nowadays, universities use CIS to assist in automating the overall system. This automation includes the use of multiple databases, data detail periodicity (i.e. gender, race/ethnicity, enrollment, degrees granted, and program major), record identification (e.g. social security number ‘SSN’), linking to other databases (i.e. linking unit record data with external databases such as university and employment data). The increasing demand and exposure to Internet resources and infrastructure by individuals and universities have made IT infrastructure easy targets for cybercriminals who employ sophisticated attacks such as Advanced Persistent Threats, Distributed Denial of Service attacks and Botnets in order to steal confidential data, identities of individuals and money. Hence, in order to stay in business, universities realise that it is imperative to secure vital Information Systems from easily being exploited by emerging and existing forms of cybercrimes. This study was conducted to determine and evaluate the various forms of cybercrimes and their consequences on the university network at Ahmadu Bello University, Zaria. The study was also aimed at proposing means of mitigating cybercrimes and their effects on the university network. Hence, an exploratory research design supported by qualitative research approach was used in this study. Staff of the Institute of Computing, Information and Communication technology (ICICT) were interviewed. The findings of the study present different security measures, and security tools that can be used to effectively mitigate cybercrimes. It was found that social engineering, denial of service attacks, website defacement were among the types of cybercrimes occurring on the university network. It is therefore recommended that behavioural approach in a form of motivation of staff behaviour, salary increases, and cash incentive to reduce cybercrime perpetrated by these staff.
    URI
    https://researchspace.ukzn.ac.za/handle/10413/18191
    Collections
    • Masters Degrees (Information Systems and Technology) [67]

    DSpace software copyright © 2002-2013  Duraspace
    Contact Us | Send Feedback
    Theme by 
    @mire NV
     

     

    Browse

    All of ResearchSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsAdvisorsTypeThis CollectionBy Issue DateAuthorsTitlesSubjectsAdvisorsType

    My Account

    LoginRegister

    DSpace software copyright © 2002-2013  Duraspace
    Contact Us | Send Feedback
    Theme by 
    @mire NV