M.Com. (Computer Auditing)Abstract: This research investigated the different information technology (IT) security threats that the university faces and the concept of IT security awareness. The research has become increasingly relevant because IT plays an important role to prevent the interruption of a university network in the event of a cyber-attack. Thus, universities must consider the importance of creating IT security awareness. However, IT risks such as phishing, hacking, viruses and stolen passwords often expose universities to cyber-attacks. As a consequence of these ongoing IT security risks, universities must fully understand the importance of IT security and the impact it could have on the institution. To achieve the research obj...
This paper is concerned with issues relating to security in the provision of information systems (IS...
This study was conducted to determine the extent of management of computer security threats of the D...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Information Technology (IT) expansion exposes organisations in developing countries to IT security r...
The use of technical information system security measures may prove insufficient in protecting infor...
The use of technical information system security measures may prove insufficient in protecting infor...
Universities, like other businesses, use information communication technology (ICT) to promote globa...
Partial fulfillment for award of the degree of Master of Information Technologyn Kenya, rarely are c...
Information Technology transformed the way people executed their tasks at work. With the information...
As universities migrate online due to the advent of Covid-19, there is a need for enhanced security ...
MBA, North-West University, Vanderbijlpark CampusAs is the case with many organisations worldwide, b...
Cyber security has emerged as a critical concern in today's digital age, affecting various sectors a...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom ...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
This paper is concerned with issues relating to security in the provision of information systems (IS...
This study was conducted to determine the extent of management of computer security threats of the D...
Information security (IS) simply implies the protection and preservation of information, with its ce...
Information Technology (IT) expansion exposes organisations in developing countries to IT security r...
The use of technical information system security measures may prove insufficient in protecting infor...
The use of technical information system security measures may prove insufficient in protecting infor...
Universities, like other businesses, use information communication technology (ICT) to promote globa...
Partial fulfillment for award of the degree of Master of Information Technologyn Kenya, rarely are c...
Information Technology transformed the way people executed their tasks at work. With the information...
As universities migrate online due to the advent of Covid-19, there is a need for enhanced security ...
MBA, North-West University, Vanderbijlpark CampusAs is the case with many organisations worldwide, b...
Cyber security has emerged as a critical concern in today's digital age, affecting various sectors a...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom ...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
This paper is concerned with issues relating to security in the provision of information systems (IS...
This study was conducted to determine the extent of management of computer security threats of the D...
Information security (IS) simply implies the protection and preservation of information, with its ce...