Security: A Necessary Piece of the Collaboration Puzzle

dc.contributor.authorKisyake, Alex
dc.date.accessioned2024-04-03T14:55:10Z
dc.date.available2024-04-03T14:55:10Z
dc.date.issued2013-11-30
dc.description.abstractEducational Institutions have always been known to be the heart of complex computing systems in any region they exist especially in Africa. The existence of high end computing power often connected to the Internet and to research network grids make educational institutions soft targets for attackers. Attackers of such networks are normally either looking to exploit the large computing resources available for use in secondary attacks or to steal Intellectual Property (IP) from the research networks that institutions are normally part of. Educational Institutions also store a lot of information about their current students and staff population as well as alumni ranging from personal to financial information. Unauthorized access to such information violates statutory requirement of the law and could grossly tarnish the institutions reputation not to mention cost the institution a lot of money during post-incident activities. As collaborative research efforts start to take shape on the African continent, more and more institutions will start to put their information security guard down in order to allow seamless network access between collaborative research entities. In such environments is important for institutions to have good security practices as an attack on one institution could easily be propagated all over the research network by abusing the trust that exists between these computer networks. This paper presents findings of a three phase study that was carried out among institutions in the Research and Education Network of Uganda (RENU) in 2011 to investigate the information security practices that these institutions had in place to counter information security attacks.
Phase One of the study involved the use of a customised quantitative questionnaire tool. The tool originally developed by information security Governance task-force of EDUCAUSE was customised for use in Uganda. Phase Two involved the use of a qualitative interview guide in sessions between the investigator and respondents and in phase three, the data obtained was taken through analysis. The study investigates the performance of these institutions against five core areas; Institution Profiling, Infrastructure, Policy, Human Resource and Awareness, Policy and Self Assessment.
dc.identifier.urihttps://africarxiv.ubuntunet.net/handle/1/1438
dc.identifier.urihttps://doi.org/10.60763/africarxiv/1379
dc.identifier.urihttps://doi.org/10.60763/africarxiv/1379
dc.identifier.urihttps://doi.org/10.60763/africarxiv/1379
dc.subjectRENU
dc.subjectSecurity
dc.subjectEducause
dc.subjectNREN
dc.subjectUbuntuNet
dc.titleSecurity: A Necessary Piece of the Collaboration Puzzle

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
kisyakea.pdf
Size:
214.64 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
kisyakea-presentation.pdf
Size:
359.97 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.72 KB
Format:
Item-specific license agreed to upon submission
Description: