1.1 Background of the Study
The ability to securely connect to virtual systems is an important element within a safe and supportive learning environment. This is particularly the case within higher institutions, where students are increasingly learning in digital formats; faculty, staff, and visitors are constantly accessing and sharing information online through the school portal; and more infrastructure and facility functions are being managed online. To maintain their collaborative culture, colleges and universities house robust information technology (IT) networks and multilayered infrastructure systems with varied levels of access and connectivity. Unfortunately, this open environment has made higher institutions around the world targets of cyber-attacks in 2017 two ransom ware attacks that reinforced the need for increased higher education cyber security planning, education, and training (U.S. Computer Emergency Readiness Team, 2017). Higher institutions are not new targets for malicious cyber actors and operations. Research shows that between 2005 and 2014, 562 data breaches were reported at 324 higher institutions, with doctoral institutions marking the majority (63 percent) of those reported (EDUCAUSE, 2014). When a higher institution is threatened by a cyber-attack or threat, the effect goes beyond loss of student and employee personally identifiable information. Internet security is a wide and very important topic in our society communication system, but it is extremely dynamic and wide in scope. This is the reason that many companies and organizations invest heavily in a dedicated infrastructure security and highly trained specialists. Securing, monitoring and preventing the network from cyber threats require vigilance over the network equipment. According to studies by U.S. Chamber of Commerce, hacking, or gaining access into any computer system or network without the permission of the owner, is a leading cause of intrusions into a business’/ school information system. Hackers have a number of techniques at their disposal to take advantage of poorly protected records or credentials, but many intrusions exploit common weakness in an application or operating system software to gain unauthorized access. Some of the challenges faced at UNN ICT centre include electronic services, internet and electronic security, inconsistency in electricity supply. Strong administrative, physical and technical security measures are vital to ensure a safe ICT centre at University of Nigeria, Enugu Campus.
1.2 Statement of the Problem
There are a variety of general threats to a network and its infrastructure, such as through distributed denial of service attacks that may directly or indirectly target the institution’s network. Criminal and fraudulent threats target users in order to obtain personal data for identity fraud (Andrew C., Vincent W. 2005). There are also increasingly targeted attempts to obtain potentially sensitive data from organizations. This may include personal data of students or staff held by the institution or certain types of information, such as research, for commercial or political means.
This project is an interest in taking up a challenging work in this particular area of research to test one’s confidence.
1.4 Aims and Objectives
This study aims at the design and implementation of an internet security package. The specific objectives are.
1.5 Significance of the Study
This work will help in a good number of ways to monitor and secure the activities performed in the ICT centre. The software developed will help the ICT centre to achieve an efficient security system.
1.6 Project Report Organization
This study titled “design and implementation of an internet security package (A study of ICT centre University of Nigeria Enugu Campus)” is organized into five main chapters: Chapter one of this study is the Introduction. This chapter provides the background to the problem. Next is chapter two which is literature review. This chapter provides information on the basic concepts and related work on the subject matter.
Chapter Three contains the research methodology. This attempts to provide a detailed description of the phases and approach in the development of the study by providing an analysis of the existing system and a design of the proposed system.
Chapter Four captures the implementation of the proposed system design and states results gathered in the course of implementation.
Chapter Five which is the concluding chapter, includes the summary, conclusion and recommendation.
1.7 Definition of Terms
The following are some terms commonly used in this report.
Other topics you might be interested in:
Most viewed topics: