Challenges and Strategies for Enhancing ICT Security in Public Institutions


Authors : Okafor Godwin; Dr. Martha O. Musa

Volume/Issue : Volume 9 - 2024, Issue 7 - July


Google Scholar : https://tinyurl.com/5pf3cz6k

Scribd : https://tinyurl.com/4yw8uy67

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUL1024

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : This study explores the challenges faced by public institutions in implementing and maintaining effective ICT security controls, focusing on the University of Port Harcourt. By examining the perceptions of various stakeholders, including ICT administrators, staff, and students, the research identifies key issues related to confidentiality, integrity, and availability within the institution's ICT systems. The findings highlight significant areas for improvement, such as policy enforcement, training, and risk management. The article provides practical recommendations and strategies for public institutions to enhance their ICT security measures, ensuring alignment with the CIA Triad model and addressing emerging security threats. These insights are crucial for policymakers and ICT professionals aiming to strengthen the security posture of educational institutions.

Keywords : ICT Security, CIA Triad, Public Institutions, Cyber Security.

References :

  1. Abu Al-Haija, Q., & Alsulami, A. A. (2022). Detection of fake replay attack signals on remote keyless controlled vehicles using pre-trained deep neural network. Electronics, 11(20), 3376.
  2. Alhawi, O. M., Mustafa, M. A., & Cordiro, L. C. (2019, September). Finding security vulnerabilities in unmanned aerial vehicles using software verification. In 2019 International Workshop on Secure Internet of Things (SIOT) (pp. 1-9). IEEE.
  3. Al-Shanfari, I., Warusia, Yassin., Nasser, Tabook., Roslan, Ismail., Anuar, Ismail. (2022). Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees. International Journal of Advanced Computer Science and Applications,  doi: 10.14569/ijacsa.2022.0130855
  4. Bania, A., Iatrellis, O., & Samaras, N. (2023). Information Communication Technologies (ICTs) and Disaster Risk Management (DRM): Systematic Literature Review. In Conference on Sustainable Urban Mobility (pp. 1779-1794). Springer, Cham.
  5. Banik, S., & Banik, T. (2024). Survey on Simulation and Vulnerability Testing in Smart Grid.
  6. Crihan, G., Craciun, M., & Dumitriu, L. (2022). Hybrid methods of authentication in network security. The Annals of “Dunarea de Jos “University of Galati. Fascicle III, Electrotechnics, Electronics, Automatic Control, Informatics, 45(1), 7-7.
  7. Fabian, B., Gürses, S., Heisel, M., Santen, T., & Schmidt, H. (2010). A comparison of security requirements engineering methods. Requirements engineering, 15, 7-40.
  8. Horalek, J., & Sobeslav, V. (2023). Security Baseline for Substation Automation Systems. Sensors, 23(16), 7125.
  9. Iordache, C. A., Dragomir, A. V., & Marian, C. V. (2022, November). Public institutions updated enhanced biometric security, zero trust architecture and multi-factor authentification. In 2022 International Symposium on Electronics and Telecommunications (ISETC) (pp. 1-4). IEEE.
  10. Karuvade, S., & Sanders, B. C. (2021). Security for Quantum Networks. arXiv preprint arXiv:2109.14107.
  11. Mahadi, N. A., Mohamed, M. A., Mohamad, A. I., Makhtar, M., Kadir, M. F. A., & Mamat, M. (2018). A survey of machine learning techniques for behavioral-based biometric user authentication. Recent Advances in Cryptography and Network Security, 43-59.
  12. Ngwenya, M., & Ngoepe, M. (2020). A framework for data security, privacy, and trust in “consumer internet of things” assemblages in South Africa. Security and Privacy, 3(5), e122.
  13. Ogunode, N. J., Somadina, O. I., & Olatunde-Aiyedun, T. G. (2021). Challenges and problems of deployment of ICT facilities by public higher institutions during Covid-19 in Nigeria. Ogunode, NJ, Okwelogu, IS & Olatunde-Aiyedun, TG (2021). Challenges and problems of deployment of ICT facilities by public higher institutions during Covid-19 in Nigeria. International Journal of Discoveries and Innovations in Applied Sciences, 1(4), 30-37.
  14. Semlambo, A. A., Mfoi, D. M., & Sangula, Y. (2022). Information systems security threats and vulnerabilities: A case of the Institute of Accountancy Arusha (IAA). Journal of Computer and Communications, 10(11), 29-43.
  15. Sudarsa, D., Rao, A. N., & Sivakumar, A. P. (2024). Data Security Optimization at Cloud Storage using Confidentiality-based Data Classification. International Journal of Advanced Computer Science & Applications, 15(5).
  16. Yakasai, B. A. (2022). Introduction Of ICT To Reshape Public Institutions In Rural Areas. Farabi Journal of Social Sciences, 8(2), 74-78.
  17. Żebrowski, P., Couce‐Vieira, A., & Mancuso, A. (2022). A Bayesian framework for the analysis and optimal mitigation of cyber threats to cyber‐physical systems. Risk Analysis, 42(10), 2275-2290.

This study explores the challenges faced by public institutions in implementing and maintaining effective ICT security controls, focusing on the University of Port Harcourt. By examining the perceptions of various stakeholders, including ICT administrators, staff, and students, the research identifies key issues related to confidentiality, integrity, and availability within the institution's ICT systems. The findings highlight significant areas for improvement, such as policy enforcement, training, and risk management. The article provides practical recommendations and strategies for public institutions to enhance their ICT security measures, ensuring alignment with the CIA Triad model and addressing emerging security threats. These insights are crucial for policymakers and ICT professionals aiming to strengthen the security posture of educational institutions.

Keywords : ICT Security, CIA Triad, Public Institutions, Cyber Security.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe