CONFIDENTIALITY AND AVAILABILITY OF SECURITY MEASURES FOR INFORMATION SYSTEMS IN UNIVERSITIES IN KISUMU AND SIAYA COUNTIES, KENYA
Abstract
Many organizations continue to grow in numbers by the day in adopting use and adoption of ICT in day to day business processes and so are the rising trends in cyber insecurity. Securing information systems against myriad spectrum of threats requires use of multiple, overlapping protection approaches addressing people, technology and operational processes. ICT policies are put in place in institutions to provide guidelines and standards on what is acceptable and what is not as regards to use of ICT systems. In spite of these ICT policies, numerous instances all over the world have been reported whereby university systems were compromised and university information exposed to other third parties or malicious activities or unintentional errors. According to a report published by Oracle (2008), there have been hundreds of data breaches costing millions of dollars and damaging universities’ reputation. There is no evidence that research has been carried out in the past to assess the level of compliance to ICT security policies by the institutions of higher learning. This study therefore sought to bridge this gap by means of a survey, to investigate and describe the level of compliance to ICT security policies in terms of confidentiality and availability in Universities in Kisumu and Siaya Counties, Kenya
Downloads
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere. Author(s) agree to the terms that the IJRDO Journal will have the full right to remove the published article on any misconduct found in the published article.