The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Network and Data Transfer Security Management in Higher Educational Institutions
Abstract
This chapter explored communications security through the use of an empirical survey to assess the extent of network and data transfer security management in Ghanaian higher educational institutions. Network security management controls consist of monitoring of networks, posture checking, network segmentation, and defense-in-depth. Data transfer security management includes encryption, media access control, and protection of data from public networks. Data were collected from information technology (IT) personnel. The ISO/IEC 21827 maturity model for assessing IT security posture was used to measure the controls. Overall, the result showed that the institutions were at the planned stage of communications security management. In particular, network monitoring, defense-in-depth, and the protection of data from public networks were the most applied controls. Conversely, posture checking was the least applied control. Higher educational institutions need to review their communications security plans and better manage network and data transfer security controls to mitigate data breaches.
Related Content
Mohd Azeem Faizi Noor, Saba Khanum, Taushif Anwar, Manzoor Ansari.
© 2023.
20 pages.
|
Padmavathi U., Narendran Rajagopalan.
© 2023.
16 pages.
|
Chandrasekar Ravi, Praveensankar Manimaran.
© 2023.
12 pages.
|
Jay Kumar Jain, Varsha Jain.
© 2023.
18 pages.
|
Dominik Hromada, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão.
© 2023.
21 pages.
|
Santosh Kumar Smmarwar, Govind P. Gupta, Sanjay Kumar.
© 2023.
20 pages.
|
Andreia Robert Lopes, Ana Sofia Dias, Bebiana Sá-Moura.
© 2023.
24 pages.
|
|
|