Authors :
Okafor Godwin; Dr. Martha O. Musa
Volume/Issue :
Volume 9 - 2024, Issue 7 - July
Google Scholar :
https://tinyurl.com/5pf3cz6k
Scribd :
https://tinyurl.com/4yw8uy67
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUL1024
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
This study explores the challenges faced by
public institutions in implementing and maintaining
effective ICT security controls, focusing on the University
of Port Harcourt. By examining the perceptions of various
stakeholders, including ICT administrators, staff, and
students, the research identifies key issues related to
confidentiality, integrity, and availability within the
institution's ICT systems. The findings highlight
significant areas for improvement, such as policy
enforcement, training, and risk management. The article
provides practical recommendations and strategies for
public institutions to enhance their ICT security
measures, ensuring alignment with the CIA Triad model
and addressing emerging security threats. These insights
are crucial for policymakers and ICT professionals
aiming to strengthen the security posture of educational
institutions.
Keywords :
ICT Security, CIA Triad, Public Institutions, Cyber Security.
References :
- Abu Al-Haija, Q., & Alsulami, A. A. (2022). Detection of fake replay attack signals on remote keyless controlled vehicles using pre-trained deep neural network. Electronics, 11(20), 3376.
- Alhawi, O. M., Mustafa, M. A., & Cordiro, L. C. (2019, September). Finding security vulnerabilities in unmanned aerial vehicles using software verification. In 2019 International Workshop on Secure Internet of Things (SIOT) (pp. 1-9). IEEE.
- Al-Shanfari, I., Warusia, Yassin., Nasser, Tabook., Roslan, Ismail., Anuar, Ismail. (2022). Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees. International Journal of Advanced Computer Science and Applications, doi: 10.14569/ijacsa.2022.0130855
- Bania, A., Iatrellis, O., & Samaras, N. (2023). Information Communication Technologies (ICTs) and Disaster Risk Management (DRM): Systematic Literature Review. In Conference on Sustainable Urban Mobility (pp. 1779-1794). Springer, Cham.
- Banik, S., & Banik, T. (2024). Survey on Simulation and Vulnerability Testing in Smart Grid.
- Crihan, G., Craciun, M., & Dumitriu, L. (2022). Hybrid methods of authentication in network security. The Annals of “Dunarea de Jos “University of Galati. Fascicle III, Electrotechnics, Electronics, Automatic Control, Informatics, 45(1), 7-7.
- Fabian, B., Gürses, S., Heisel, M., Santen, T., & Schmidt, H. (2010). A comparison of security requirements engineering methods. Requirements engineering, 15, 7-40.
- Horalek, J., & Sobeslav, V. (2023). Security Baseline for Substation Automation Systems. Sensors, 23(16), 7125.
- Iordache, C. A., Dragomir, A. V., & Marian, C. V. (2022, November). Public institutions updated enhanced biometric security, zero trust architecture and multi-factor authentification. In 2022 International Symposium on Electronics and Telecommunications (ISETC) (pp. 1-4). IEEE.
- Karuvade, S., & Sanders, B. C. (2021). Security for Quantum Networks. arXiv preprint arXiv:2109.14107.
- Mahadi, N. A., Mohamed, M. A., Mohamad, A. I., Makhtar, M., Kadir, M. F. A., & Mamat, M. (2018). A survey of machine learning techniques for behavioral-based biometric user authentication. Recent Advances in Cryptography and Network Security, 43-59.
- Ngwenya, M., & Ngoepe, M. (2020). A framework for data security, privacy, and trust in “consumer internet of things” assemblages in South Africa. Security and Privacy, 3(5), e122.
- Ogunode, N. J., Somadina, O. I., & Olatunde-Aiyedun, T. G. (2021). Challenges and problems of deployment of ICT facilities by public higher institutions during Covid-19 in Nigeria. Ogunode, NJ, Okwelogu, IS & Olatunde-Aiyedun, TG (2021). Challenges and problems of deployment of ICT facilities by public higher institutions during Covid-19 in Nigeria. International Journal of Discoveries and Innovations in Applied Sciences, 1(4), 30-37.
- Semlambo, A. A., Mfoi, D. M., & Sangula, Y. (2022). Information systems security threats and vulnerabilities: A case of the Institute of Accountancy Arusha (IAA). Journal of Computer and Communications, 10(11), 29-43.
- Sudarsa, D., Rao, A. N., & Sivakumar, A. P. (2024). Data Security Optimization at Cloud Storage using Confidentiality-based Data Classification. International Journal of Advanced Computer Science & Applications, 15(5).
- Yakasai, B. A. (2022). Introduction Of ICT To Reshape Public Institutions In Rural Areas. Farabi Journal of Social Sciences, 8(2), 74-78.
- Żebrowski, P., Couce‐Vieira, A., & Mancuso, A. (2022). A Bayesian framework for the analysis and optimal mitigation of cyber threats to cyber‐physical systems. Risk Analysis, 42(10), 2275-2290.
This study explores the challenges faced by
public institutions in implementing and maintaining
effective ICT security controls, focusing on the University
of Port Harcourt. By examining the perceptions of various
stakeholders, including ICT administrators, staff, and
students, the research identifies key issues related to
confidentiality, integrity, and availability within the
institution's ICT systems. The findings highlight
significant areas for improvement, such as policy
enforcement, training, and risk management. The article
provides practical recommendations and strategies for
public institutions to enhance their ICT security
measures, ensuring alignment with the CIA Triad model
and addressing emerging security threats. These insights
are crucial for policymakers and ICT professionals
aiming to strengthen the security posture of educational
institutions.
Keywords :
ICT Security, CIA Triad, Public Institutions, Cyber Security.