IDEAS home Printed from https://ideas.repec.org/p/vor/issues/2024-50-03.html
   My bibliography  Save this paper

Model Based On Virtual Private Network: Enhancing Cybersecurity In The Rwandan University Sector

Author

Listed:
  • BANA Philbert

Abstract

The rapid growth of technology and digitalization has revolutionized the way universities operate and conduct their academic activities. However, this progress has also exposed the Rwandan university sector to an ever-increasing range of cyber threats and vulnerabilities. The main objective of this research is to design and implement a robust model based on Virtual Private Network (VPN) technology to enhance cyber security in the Rwandan universities. The problem statement revolves around not only escalating cyber security challenges and loopholes at the Universities, but also issue of using a single security measure of currently using only firewall as a security measures which has some drawbacks, and all these may lead to data breaches, unauthorized access, and potential loss of sensitive information. To achieve the research objectives, a mixed-methods approach has been adopted, qualitative data have been gathered through interviews and focus groups with IT related personnel to gain insights into the existing security vulnerabilities and concerns. Additionally, quantitative data have been collected to assess the frequency and nature of cyber-attacks experienced by the Universities. The study used different tools including Eve-ng, AnyConnect, VMware workstation and Wireshark for network traffic analysis. In this project, a novel and practical model based on Virtual Private Network technology has been designed to reinforce the cyber security infrastructure of the University of Kigali. Secondly, the research findings shed light on the current cyber security landscape in the Rwandan university sector and provide valuable recommendations to other universities in the country to bolster their own security measures. Key words: Virtual Private Network, cybersecurity, Network Access Control, Intrusion Detection System

Suggested Citation

  • BANA Philbert, 2024. "Model Based On Virtual Private Network: Enhancing Cybersecurity In The Rwandan University Sector," Working papers 2024-50-03, Voice of Research.
  • Handle: RePEc:vor:issues:2024-50-03
    as

    Download full text from publisher

    File URL: http://voiceofresearch.org/Doc/Jun-2024/Jun-2024_3.pdf
    File Function: Full text
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Joachim Bjørge Ulven & Gaute Wangen, 2021. "A Systematic Review of Cybersecurity Risks in Higher Education," Future Internet, MDPI, vol. 13(2), pages 1-40, February.
    2. Kelvin Mukolo Kayombo & Steve Carter, 2017. "Competitive Positioning of a Higher Education Institution in Zambia: The Case of ZCAS," Journal of Education and Vocational Research, AMH International, vol. 8(2), pages 6-21.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.
    2. Jin Li & Wei Xiao & Chong Zhang, 2023. "Data security crisis in universities: identification of key factors affecting data breach incidents," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-18, December.

    More about this item

    Keywords

    virtual private network; cybersecurity; network access control; intrusion detection system;
    All these keywords.

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:vor:issues:2024-50-03. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dr. Avdhesh Jha (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.