Affiliation:
1. Pentecost University College, Ghana
2. Kwame Nkrumah University of Science and Technology, Ghana
Abstract
This chapter explored communications security through the use of an empirical survey to assess the extent of network and data transfer security management in Ghanaian higher educational institutions. Network security management controls consist of monitoring of networks, posture checking, network segmentation, and defense-in-depth. Data transfer security management includes encryption, media access control, and protection of data from public networks. Data were collected from information technology (IT) personnel. The ISO/IEC 21827 maturity model for assessing IT security posture was used to measure the controls. Overall, the result showed that the institutions were at the planned stage of communications security management. In particular, network monitoring, defense-in-depth, and the protection of data from public networks were the most applied controls. Conversely, posture checking was the least applied control. Higher educational institutions need to review their communications security plans and better manage network and data transfer security controls to mitigate data breaches.
Reference42 articles.
1. College and university data breaches: Regulating higher educaiton cybersecurity under state and federal law.;K.Beaudin;The Journal of College and University Law,2015
2. Securing cyberspace: Identifying key actors in hacker communities
3. COMPREHENSIVE APPROACH TO INFORMATION SHARING FOR INCREASED NETWORK SECURITY AND SURVIVABILITY
4. Data breaches in higher education.;L.Coleman;Journal of Business Cases and Applications,2015
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献