APPLICATION OF CRYPTOGRAPHY FOR INFORMATION SECURITY IN UMARU MUSA YAR’ADUA UNIVERSITY, KATSINA

TABLE OF CONTENTS
Title page
Table of Contents
Abbreviations
Abstract

CHAPTER ONE: INTRODUCTION
1.1       Background to the Study
1.1.1    Cryptography
1.1.2    Historical Background of Umaru Musa Yar‟adua University, Katsina
1.1.3    Information System
1.1.4    Database System
1.1.5    Challenges of Database System
1.1.6    Information Security
1.1.7    Use of Cryptography for Information Security
1.2       Statement of the Problem
1.3       Research Questions
1.4       Research Hypotheses
1.5       Objectives of the Study
1.6       Significance of the Study
1.7       Delimitation of the Study
1.8       Limitation of the Study
1.9       Operational Definition of Key Terms
References

CHAPTER TWO: REVIEW OF RELATED LITERATURE
2.1       Introduction
2.2       Application of Cryptography for Information Security
2.3       Types of Databases Available and Accessible
2.4       Security Threats Faced by Databases
2.5       Cryptography Prevention of Security Breach
2.6       Challenges Encountered in the Application of Cryptography
2.7       Summary of the Review
            References

CHAPTER THREE: RESEARCH METHODOLOGY
3.1       Introduction
3.2       Research Method Adopted for the Study
3.3       Population of the Study
3.4       Sample and Sampling Techniques
3.5       Instruments for Data Collection
3.6       Validity of the Instruments
3.7       Reliability of the Instruments
3.8       Method for Data Collection
3.9       Procedures for Data Analysis
References

CHAPTER FOUR: DATA PRESENTATION, ANALYSIS AND DISCUSSION
4.1       Introduction
4.2       Response Rate
4.3       Descriptive Analysis
4.4       Inferential Analysis
References

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1       Introduction
5.2       Summary of the Study
5.3       Summary of the Major Findings
5.4       Conclusion
5.5       Recommendations
5.6       Suggestions for Further Study
Bibliography
Appendix



ABSTRACT
This    study    sets     to    investigate     the    Application     of    Cryptography     for

Information Security in Umaru Musa Yar’adua University, Katsina. Four research questions were formulated and two hypotheses tested at α 0.05. The research questions, among others, sought to find out what types of databases are available and accessible in Umaru Musa Yar’adua University, Katsina? What types of security threats are databases in Umaru Musa Yar’adua

University, Katsina exposed to? Survey research design was used for this study. The population of the study comprised all staff of the Directorate of

Information  and  Communication  Technology  in  Umaru  Musa  Yar’adua

University, Katsina. Due to the fact that the population is not too large, all the 21 staff were used as sample for this study. Hence no sampling technique was applied. Questionnaire and observation were the instruments used to collect data for this study. The data collected were presented and analysed using frequency distribution tables, and percentages. While null hypothesis one was tested using PPMC and null hypothesis two was tested using Chi-Square. The study found among others that personnel records database, financial records database, transcript records database, and student academic records database were the types of databases available with the highest frequencies of 100.0% response scores respectively in UMYUK. It was also revealed that data tempering, password-related threats, worms, intrusion by unauthorized users, clicking unnecessary links and privilege abuse were the security threats exposed to the databases with the highest frequencies of over 60% response scores respectively in the University. On the hypotheses tested, it was found that there is no significant relationship between database accessibility and the types of security threats they are exposed to in Umaru Musa Yar’adua University, Katsina. Application of cryptography has no significant effect on the prevention of security breaches of databases in the University studied. This study recommended that the University should adopt strategic information records database for keeping records of valuable assets, day-to-day operations, and executive decision-making and intellectual rights in efforts to prevent theft of institutions’ secrets and confidential documents. Lastly, Information security risk assessment and management should be made an integral component of DICT policy document. This would go a long way in preventing and minimizing the threat level of data by intruders and other malicious attacks in the University’s databases. This is a prerequisite for the University to successfully survive and compete in the 21st Century.


CHAPTER ONE
INTRODUCTION                    `
1.1              Background to the Study
The 21ST Century is designated the information age, because of the crucial role of information in its evolution. According to Sveiby (1994), the word information is derived from Latin “informare” which means give form to. Most people tend to think of information as disjointed little bundles of "facts". Due to the dynamic nature and ever changing characteristic tendencies of information, Mohammed (2012) conceptualized information as whatever we physically or otherwise come across consciously or unconsciously, accidentally or intentionally and regularly or occasionally that adds positively or otherwise to our existing knowledge; education and training; curricula; skills; practices; ideas; ideals; culture; tradition; belief; expectations; experiences and wellbeing.

The mode and presentation of information is enhanced by the use of appropriate Information and Communication Technology (ICT). ICT can simply be referred to as an information system comprised of organized information manager and users; computer hardware and software; communication networks and data/information resources that acquire and collect, organize and transform; store and receive; as well as disseminate and transfer relevant information to the relevant users, regardless of their location, time of accesses and need, and irrespective of their strata in society (Mohammed, 2009).

One of the main paradigm shifts of the emerging information society is that information is becoming a crucial if not the most important resource (Maurer, 2004). Information is currently created, stored, preserved and transmitted in.....

For more Library & Information Science Projects click here
================================================================
Item Type: Project Material  |  Size: 105 pages  |  Chapters: 1-5
Format: MS Word  |  Delivery: Within 30Mins.
================================================================

Share:

Search for your topic here

See full list of Project Topics under your Department Here!

Featured Post

HOW TO WRITE A RESEARCH HYPOTHESIS

A hypothesis is a description of a pattern in nature or an explanation about some real-world phenomenon that can be tested through observ...

Popular Posts