Utilisation of Information Security Mechanisms for Combating Pharming on University Websites in Northern Regionsof Nigeria
This paper investigates the“utilisation of information security mechanisms for combating pharming on University Websites in Northern Regions of Nigeria”. Two objectives were formulated: to identify the “type of information security mechanisms employed for combating pharming on University Websites in Northern Regions of Nigeria”; and to determine the “effectiveness of the information security mechanisms employed for combating pharming on University Websites in Northern Regions of Nigeria”. Quantitative research methodology was used for the study. 9 Universities in Northern Regions of Nigeria with 127 ICT personnel were selected. The questionnaire was used as an instrument in collecting the data. Mean and standard deviationwere used to present and analyse the data collected in the study. The research found that “detectives, preventive and mitigative mechanisms” were the types of “mechanisms employed for combating pharming on Universities studied”; it was also found that “mitigative and detective information security mechanisms employed are more effective than preventive mechanisms in combating pharming on University studied”. The paper concludes that, if security safeguards are not adequate, pharmers affect the “functionality of University websites undetected”. They can attack websites using skills the software developers never imagined. The study recommended that to guarantee information effective information security, therefore, ICT personnel need to establish strong preventive measures and quality management practices that will protect data during collection, processing, and storage from pharmers.
Johansen, G.A. (2019). What is pharming and how to protect yourself. Retrieved on 16th February, 2021 from https://us.norton.com/internetsecurity-online-scams-what-is-pharming.html
Kessler, G. (2013). An Overview of Cryptography. Retrieved 8th May, 2018 from http://www.garykessler.net/kumquat_pubkey.html.
Schneider, L. (2013). Information Security - Learn about Information Security.
Retrieved on 16th March, 2018. From http://www.about.com/.
Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F. & Downs, J. (2010). Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. Proc. of the 28th International Conference on Human Factors in Computing Systems, USA.
Stallings, W. (2005). Cryptography and Network Security, Principles and Practices. Third Edition. USA: Pearson Education, Inc.
Symantec (2016). Online fraud: pharming. Retrieved on 15th April, 2018 from http:// us.norton.com/.
Copyright (c) 2021 GPH - International Journal Of Computer Science and Engineering
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere. Author(s) agree to the terms that the GPH Journal will have the full right to remove the published article on any misconduct found in the published article.