I am a seasoned IT Professional with expertise in Design, Networking, Systems Engineering, Network Security and Database Management Systems with over Thirteen (13) years industry experience. I have carried out many network design and implementation project across the various sector.
Campus network is a valuable strategic asset that is required in 21st century education. Many ava... more Campus network is a valuable strategic asset that is required in 21st century education. Many available campus networks in Nigerian Universities today were carried out on Ad-hoc basis which are problematic, difficult to maintain, underperforming thereby constituting wastage of scarce resources. A good campus network requires proper planning, design and implementation which must be done dutifully. This work involves the planning, design, implementation and testing of a scalable campus network for Elizade University following industry best practices. The planning phase involved the gathering of existing literature on the subject, developing the project plan, setting the deliverables, gathering user requirements and finally adopting a methodology to be used while the design involved identifying the network features, hierarchical logical and physical designs, hardware specification, IPv4 Addressing scheme and VLAN design. While implementation involved a simulation of the implementation on Cisco Packet Tracer and pilot implementation on campus. The implemented network was tested based on the defined testing specification
Information security management (ISM) is an important endeavour in today’s world where data and i... more Information security management (ISM) is an important endeavour in today’s world where data and information are now critical assets of businesses and government. The purpose of this study was to conduct an empirical exploration and appraisal of the current state of information security management within IHEs in Yola Nigeria through the set objectives and research questions. The study employed a documentary research and qualitative interview of three case study institutions of higher education within Yola metropolis to assess the state of their ISM. The findings from the qualitative research shows that the IHEs were relatively aware of the threats such as social engineering, privilege misuse, and unauthorized modifications facing it. Majority of threats are from inside sources predominantly from students, while motives ranges from financial gains, academic gains and fun. The findings also revealed that all the case study institutions were still struggling with ISM as none of the institution had a documented and structured ISM program, an information security or cyber security unit charged with the responsibilities of information security. Information security awareness is still at the lowest level across the institutions. The top factors hindering ISM in the institutions are budgetary constraint, lack of top management support, lack of security professionals and internal politics while the top impact of a breach on IHEs are reputational damage, loss of public trust and financial loss. The study based on the findings proposed an integrated ISM framework as recommendations for both the IHEs, government and regulatory bodies. The framework, which was derived from the primary data comprises of two main components (internal and external) with four iterative security objectives: prepare and assess, detect, defend and heal and recover.
Campus network is a valuable strategic asset that is required in 21st century education. Many ava... more Campus network is a valuable strategic asset that is required in 21st century education. Many available campus networks in Nigerian Universities today were carried out on Ad-hoc basis which are problematic, difficult to maintain, underperforming thereby constituting wastage of scarce resources. A good campus network requires proper planning, design and implementation which must be done dutifully. This work involves the planning, design, implementation and testing of a scalable campus network for Elizade University following industry best practices. The planning phase involved the gathering of existing literature on the subject, developing the project plan, setting the deliverables, gathering user requirements and finally adopting a methodology to be used while the design involved identifying the network features, hierarchical logical and physical designs, hardware specification, IPv4 Addressing scheme and VLAN design. While implementation involved a simulation of the implementation on Cisco Packet Tracer and pilot implementation on campus. The implemented network was tested based on the defined testing specification
Information security management (ISM) is an important endeavour in today’s world where data and i... more Information security management (ISM) is an important endeavour in today’s world where data and information are now critical assets of businesses and government. The purpose of this study was to conduct an empirical exploration and appraisal of the current state of information security management within IHEs in Yola Nigeria through the set objectives and research questions. The study employed a documentary research and qualitative interview of three case study institutions of higher education within Yola metropolis to assess the state of their ISM. The findings from the qualitative research shows that the IHEs were relatively aware of the threats such as social engineering, privilege misuse, and unauthorized modifications facing it. Majority of threats are from inside sources predominantly from students, while motives ranges from financial gains, academic gains and fun. The findings also revealed that all the case study institutions were still struggling with ISM as none of the institution had a documented and structured ISM program, an information security or cyber security unit charged with the responsibilities of information security. Information security awareness is still at the lowest level across the institutions. The top factors hindering ISM in the institutions are budgetary constraint, lack of top management support, lack of security professionals and internal politics while the top impact of a breach on IHEs are reputational damage, loss of public trust and financial loss. The study based on the findings proposed an integrated ISM framework as recommendations for both the IHEs, government and regulatory bodies. The framework, which was derived from the primary data comprises of two main components (internal and external) with four iterative security objectives: prepare and assess, detect, defend and heal and recover.
Uploads
Papers by Andrew Abaye
Thesis Chapters by Andrew Abaye
The findings from the qualitative research shows that the IHEs were relatively aware of the threats such as social engineering, privilege misuse, and unauthorized modifications facing it. Majority of threats are from inside sources predominantly from students, while motives ranges from financial gains, academic gains and fun. The findings also revealed that all the case study institutions were still struggling with ISM as none of the institution had a documented and structured ISM program, an information security or cyber security unit charged with the responsibilities of information security. Information security awareness is still at the lowest level across the institutions. The top factors hindering ISM in the institutions are budgetary constraint, lack of top management support, lack of security professionals and internal politics while the top impact of a breach on IHEs are reputational damage, loss of public trust and financial loss.
The study based on the findings proposed an integrated ISM framework as recommendations for both the IHEs, government and regulatory bodies. The framework, which was derived from the primary data comprises of two main components (internal and external) with four iterative security objectives: prepare and assess, detect, defend and heal and recover.
The findings from the qualitative research shows that the IHEs were relatively aware of the threats such as social engineering, privilege misuse, and unauthorized modifications facing it. Majority of threats are from inside sources predominantly from students, while motives ranges from financial gains, academic gains and fun. The findings also revealed that all the case study institutions were still struggling with ISM as none of the institution had a documented and structured ISM program, an information security or cyber security unit charged with the responsibilities of information security. Information security awareness is still at the lowest level across the institutions. The top factors hindering ISM in the institutions are budgetary constraint, lack of top management support, lack of security professionals and internal politics while the top impact of a breach on IHEs are reputational damage, loss of public trust and financial loss.
The study based on the findings proposed an integrated ISM framework as recommendations for both the IHEs, government and regulatory bodies. The framework, which was derived from the primary data comprises of two main components (internal and external) with four iterative security objectives: prepare and assess, detect, defend and heal and recover.