Network and Data Transfer Security Management in Higher Educational Institutions

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Citations (Scopus)

Abstract

This chapter explored communications security through the use of an empirical survey to assess the extent of network and data transfer security management in Ghanaian higher educational institutions. Network security management controls consist of monitoring of networks, posture checking, network segmentation, and defense-in-depth. Data transfer security management includes encryption, media access control, and protection of data from public networks. Data were collected from information technology (IT) personnel. The ISO/IEC 21827 maturity model for assessing IT security posture was used to measure the controls. Overall, the result showed that the institutions were at the planned stage of communications security management. In particular, network monitoring, defense-in-depth, and the protection of data from public networks were the most applied controls. Conversely, posture checking was the least applied control. Higher educational institutions need to review their communications security plans and better manage network and data transfer security controls to mitigate data breaches.

Original languageEnglish
Title of host publicationResearch Anthology on Business Aspects of Cybersecurity
PublisherIGI Global
Pages514-532
Number of pages19
ISBN (Electronic)9781668436998
ISBN (Print)9781668436981
DOIs
Publication statusPublished - 1 Jan 2021
Externally publishedYes

Fingerprint

Dive into the research topics of 'Network and Data Transfer Security Management in Higher Educational Institutions'. Together they form a unique fingerprint.

Cite this