An assessment of security in critical information systems used by universities in Kenya. David Gitonga Mwathi

By: Contributor(s): Description: x; 99pSubject(s): LOC classification:
  • QA76.9.A25M83 2009
Online resources:
Contents:
-
Summary: In Kenya, rarely are cases concerning data security breaches in universities reported. This does not mean that there are no such cases nor does it mean that the information systems used by the universities are secure. Further, no study has been carried to determine the extent of security in the information systems used by universities in Kenya. Occurrence of a security breach is unpredictable and so informed defence against them is important. It is against this backdrop that this study was seeking to establish the extent of security in critical university information systems in Kenya and design a security model that can be adopted by the universities. The study adopted a descriptive based approach with the use of primary and secondary data sources. Literature published in the area was reviewed and before conducing the research. Collected data was analyzed by use of descriptive statistics. Based on the findings and reviewed literature, a security model was developed. Findings show that the universities are ready to support mission critical services with most of them having stable networks (83%), firewall (86%), intrusion detection software (81%), data backup facilities (75%) as well as UPS and generators (79.55%). However, security remains a challenge; most security breaches reported are due to inadequate technical safeguards (27%), insufficient user training (32%) and lack of comprehensive formal information system security policy (32%). The research concludes that indeed university information systems are vulnerable to a significant extent and that security breaches are inevitable in the prevailing conditions. The cost of security breach is high and traditional approaches to security are no longer feasible. There is therefore a need a for a comprehensive and integrated information systems security framework.
Reviews from LibraryThing.com: List(s) this item appears in: STRATHMORE THESES & DISSERTATIONS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Thesis Thesis Strathmore University (Main Library) Open Shelf TH QA76.9.A25.M83 2009 Not for loan 69823
Total holds: 0

-

In Kenya, rarely are cases concerning data security breaches in universities reported. This does not mean that there are no such cases nor does it mean that the information systems used by the universities are secure. Further, no study has been carried to determine the extent of security in the information systems used by universities in Kenya. Occurrence of a security breach is unpredictable and so informed defence against them is important. It is against this backdrop that this study was seeking to establish the extent of security in critical university information systems in Kenya and design a security model that can be adopted by the universities.

The study adopted a descriptive based approach with the use of primary and secondary data sources. Literature published in the area was reviewed and before conducing the research. Collected data was analyzed by use of descriptive statistics. Based on the findings and reviewed literature, a security model was developed.

Findings show that the universities are ready to support mission critical services with most of them having stable networks (83%), firewall (86%), intrusion detection software (81%), data backup facilities (75%) as well as UPS and generators (79.55%). However, security remains a challenge; most security breaches reported are due to inadequate technical safeguards (27%), insufficient user training (32%) and lack of comprehensive formal information system security policy (32%).

The research concludes that indeed university information systems are vulnerable to a significant extent and that security breaches are inevitable in the prevailing conditions. The cost of security breach is high and traditional approaches to security are no longer feasible. There is therefore a need a for a comprehensive and integrated information systems security framework.

There are no comments on this title.

to post a comment.

© Strathmore University Library Madaraka Estate Ole, Sangale Road P. O. Box 59857 00200 City Square Nairobi Kenya
Tel.: (+254) (0)703 034000/(0)703 034200/(0)703 034300 Fax.: (+254) (0)20-607498