Educational institutions are known to be at the heart of complex computing systems in any region in which they exist, especially in Africa. The existence of high end computing power, often connected to the Internet and to research network grids, makes educational institutions soft targets for attackers. Attackers of such networks are normally either looking to exploit the large computing resources available for use in secondary attacks or to steal Intellectual Property (IP) from the research networks to which the institutions belong. Universities also store a lot of information about their current students and staff population as well as alumni ranging from personal to financial information. Unauthorized access to such information violates ...
A framework for Information Security Management Adoption in Higher Education Institutions in Somalia...
The use of technical information system security measures may prove insufficient in protecting infor...
A recent study showed no significant relationship between the security measures adopted and the rate...
Information security program endeavors to ensure that the organization’s information and its process...
Partial fulfillment for award of the degree of Master of Information Technologyn Kenya, rarely are c...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informat...
Paper presented at ICT conference of 2009.Paper presented at Strathmore University Research Week on ...
The aim of this study was to investigate the Impact of Information Security Policies on Computer Sec...
Information Technology (IT) expansion exposes organisations in developing countries to IT security r...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
The purpose of this research paper was to assess the various Intentional threats and the current uni...
Abstract- With the popularity of internet applications, many organizations are facing unprecedented ...
The increasing sophistication of information security threats and the ever-growing body of regulatio...
Information and communication technology (ICT) has become a vital part of the developing countries e...
Ethiopian government recognized the importance of ICT for the country’s development and ICT in educa...
A framework for Information Security Management Adoption in Higher Education Institutions in Somalia...
The use of technical information system security measures may prove insufficient in protecting infor...
A recent study showed no significant relationship between the security measures adopted and the rate...
Information security program endeavors to ensure that the organization’s information and its process...
Partial fulfillment for award of the degree of Master of Information Technologyn Kenya, rarely are c...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informat...
Paper presented at ICT conference of 2009.Paper presented at Strathmore University Research Week on ...
The aim of this study was to investigate the Impact of Information Security Policies on Computer Sec...
Information Technology (IT) expansion exposes organisations in developing countries to IT security r...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
The purpose of this research paper was to assess the various Intentional threats and the current uni...
Abstract- With the popularity of internet applications, many organizations are facing unprecedented ...
The increasing sophistication of information security threats and the ever-growing body of regulatio...
Information and communication technology (ICT) has become a vital part of the developing countries e...
Ethiopian government recognized the importance of ICT for the country’s development and ICT in educa...
A framework for Information Security Management Adoption in Higher Education Institutions in Somalia...
The use of technical information system security measures may prove insufficient in protecting infor...
A recent study showed no significant relationship between the security measures adopted and the rate...