Information Security Mechanisms and ICT Policy in Practice: A Case of the University of Namibia
Paulus Kautwima,
Valerianus Hashiyana,
Titus Haiduwa
Issue:
Volume 9, Issue 2, December 2021
Pages:
7-15
Received:
26 October 2021
Accepted:
22 November 2021
Published:
29 December 2021
Abstract: As new technologies emerge in the next generation of wireless communication systems so the continued rise of cyber threats and attacks in higher education institutions. In the wake of COVID-19, however, institutions of higher learning increasingly searched for alternative ways to deliver remote education. Hence, planning for cyber security became a priority and not an option due to the new level of vulnerability posed by human factors as they utilize both licensed and open-source software and wireless devices. Based on this ground, this paper discussed pertinent points on the examined ICT policy and security mechanisms as security practices and strategies implemented by the University of Namibia’s Directorate of Information & Communication Technology Services before and post the sudden shift to remote learning. It further proposed alternative strategies to curb vulnerabilities as an element of human action. Key findings show that security breaches do happen mostly due to end-user errors and not always technical issues. A qualitative research method with a random sampling technique guided the study. Virtual interviews and a survey have been used to gather data from security specialists, academics, and administrative staff. Data got analyzed in themes. It has been concluded that both people and technology are essential in information security structure. Increased awareness, training, and improved security practices are the key solutions.
Abstract: As new technologies emerge in the next generation of wireless communication systems so the continued rise of cyber threats and attacks in higher education institutions. In the wake of COVID-19, however, institutions of higher learning increasingly searched for alternative ways to deliver remote education. Hence, planning for cyber security became a...
Show More