APPLICATION OF CRYPTOGRAPHY FOR INFORMATION SECURITY IN UMARU MUSA YAR’ADUA UNIVERSITY, KATSINA


For more Library & Information Science Project click here



TABLE OF CONTENTS

Title page
Table of Contents
Abbreviations
Abstract

CHAPTER ONE: INTRODUCTION
1.1       Background to the Study
1.1.1    Cryptography
1.1.2    Historical Background of Umaru Musa Yar‟adua University, Katsina
1.1.3    Information System
1.1.4    Database System
1.1.5    Challenges of Database System
1.1.6    Information Security
1.1.7    Use of Cryptography for Information Security
1.2       Statement of the Problem
1.3       Research Questions
1.4       Research Hypotheses
1.5       Objectives of the Study
1.6       Significance of the Study
1.7       Delimitation of the Study
1.8       Limitation of the Study
1.9       Operational Definition of Key Terms
References

CHAPTER TWO: REVIEW OF RELATED LITERATURE
2.1       Introduction
2.2       Application of Cryptography for Information Security
2.3       Types of Databases Available and Accessible
2.4       Security Threats Faced by Databases
2.5       Cryptography Prevention of Security Breach
2.6       Challenges Encountered in the Application of Cryptography
2.7       Summary of the Review
            References

CHAPTER THREE: RESEARCH METHODOLOGY
3.1       Introduction
3.2       Research Method Adopted for the Study
3.3       Population of the Study
3.4       Sample and Sampling Techniques
3.5       Instruments for Data Collection
3.6       Validity of the Instruments
3.7       Reliability of the Instruments
3.8       Method for Data Collection
3.9       Procedures for Data Analysis
References

CHAPTER FOUR: DATA PRESENTATION, ANALYSIS AND DISCUSSION
4.1       Introduction
4.2       Response Rate
4.3       Descriptive Analysis
4.4       Inferential Analysis
References

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1       Introduction
5.2       Summary of the Study
5.3       Summary of the Major Findings
5.4       Conclusion
5.5       Recommendations
5.6       Suggestions for Further Study
Bibliography
Appendix



ABSTRACT

This    study    sets     to    investigate     the    Application     of    Cryptography     for

Information Security in Umaru Musa Yar’adua University, Katsina. Four research questions were formulated and two hypotheses tested at α 0.05. The research questions, among others, sought to find out what types of databases are available and accessible in Umaru Musa Yar’adua University, Katsina? What types of security threats are databases in Umaru Musa Yar’adua

University, Katsina exposed to? Survey research design was used for this study. The population of the study comprised all staff of the Directorate of

Information  and  Communication  Technology  in  Umaru  Musa  Yar’adua

University, Katsina. Due to the fact that the population is not too large, all the 21 staff were used as sample for this study. Hence no sampling technique was applied. Questionnaire and observation were the instruments used to collect data for this study. The data collected were presented and analysed using frequency distribution tables, and percentages. While null hypothesis one was tested using PPMC and null hypothesis two was tested using Chi-Square. The study found among others that personnel records database, financial records database, transcript records database, and student academic records database were the types of databases available with the highest frequencies of 100.0% response scores respectively in UMYUK. It was also revealed that data tempering, password-related threats, worms, intrusion by unauthorized users, clicking unnecessary links and privilege abuse were the security threats exposed to the databases with the highest frequencies of over 60% response scores respectively in the University. On the hypotheses tested, it was found that there is no significant relationship between database accessibility and the types of security threats they are exposed to in Umaru Musa Yar’adua University, Katsina. Application of cryptography has no significant effect on the prevention of security breaches of databases in the University studied. This study recommended that the University should adopt strategic information records database for keeping records of valuable assets, day-to-day operations, and executive decision-making and intellectual rights in efforts to prevent theft of institutions’ secrets and confidential documents. Lastly, Information security risk assessment and management should be made an integral component of DICT policy document. This would go a long way in preventing and minimizing the threat level of data by intruders and other malicious attacks in the University’s databases. This is a prerequisite for the University to successfully survive and compete in the 21st Century.




CHAPTER ONE

INTRODUCTION                    `

1.1              Background to the Study

The 21ST Century is designated the information age, because of the crucial role of information in its evolution. According to Sveiby (1994), the word information is derived from Latin “informare” which means give form to. Most people tend to think of information as disjointed little bundles of "facts". Due to the dynamic nature and ever changing characteristic tendencies of information, Mohammed (2012) conceptualized information as whatever we physically or otherwise come across consciously or unconsciously, accidentally or intentionally and regularly or occasionally that adds positively or otherwise to our existing knowledge; education and training; curricula; skills; practices; ideas; ideals; culture; tradition; belief; expectations; experiences and wellbeing.

The mode and presentation of information is enhanced by the use of appropriate Information and Communication Technology (ICT). ICT can simply be referred to as an information system comprised of organized information manager and users; computer hardware and software; communication networks and data/information resources that acquire and collect, organize and transform; store and receive; as well as disseminate and transfer relevant information to the relevant users, regardless of their location, time of accesses and need, and irrespective of their strata in society (Mohammed, 2009).

One of the main paradigm shifts of the emerging information society is that information is becoming a crucial if not the most important resource (Maurer, 2004). Information is currently created, stored, preserved and transmitted in.....


For more Library & Information Science Project click here


___________________________________________________________________________
This is a General Thesis for both Undergraduate & Postgraduate Studies. The complete research material plus questionnaire and references can be obtained at an affordable price of N3,000 within Nigerian or its equivalent in other currencies.


INSTRUCTION ON HOW TO GET THE COMPLETE PROJECT MATERIAL

PAYMENT  OPTION 1:
Kindly pay a total sum of N3,000 into any of our Bank Accounts listed below:
·         Skye Bank Account:
A/C Name:      Haastrup Damilola
A/C No.:         1013708342

·         GTBank Account:
A/C Name:      Haastrup Francis
A/C No.:         0029938679
After payment, send your desired Project Topic, Depositor’s Name, Teller No., and your Active E-Mail Address to which the material would be sent for downloading (you can request for a downloading link if you don’t have an active email address) to +2348074521866 or +2348066484965. You can as well give us a direct phone call if you wish to. Projects materials are sent in Microsoft format to your mail within 30 Minutes once payment is confirmed.


PAYMENT  OPTION 2:
You can make an online payment here for this material:


After a successful Online Web Payment, kindly Click Here to fill the “Payment Details Form”


--------------------------------------------------------
N/B:    By ordering for our material means you have read and accepted our Terms and Conditions


Terms of Use: This is an academic paper. Students should NOT copy our materials word to word, as we DO NOT encourage Plagiarism. Only use as guide in developing your original research work.

Delivery Assurance
We are trustworthy and can never SCAM you. Our success story is based on the love and fear for God plus constant referrals from our clients who have benefited from our site. We deliver project materials to your Email address within 15-30 Minutes depending on how fast your payment is acknowledged by us.

Quality Assurance
All research projects, Research Term Papers and Essays on this site are well researched, supervised and approved by lecturers who are intellectuals in their various fields of study.