• Login
    View Item 
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A cyber security architecture for improving remote laboratories security: a case of Makerere University ILabs

    Thumbnail
    View/Open
    Master's Dissertation (1.102Mb)
    Date
    2023-01-09
    Author
    Katongole, Herbert
    Metadata
    Show full item record
    Abstract
    Online/remote laboratories play a very crucial role in offering practical experiments to engineering classes as a solution to offset the limitations and burdens of traditional physical laboratories. However, being online laboratories that they are, they operate over the internet and hence under a sea of threats and vulnerabilities, that compromise the integrity, availability and confidentiality of these online laboratories. This research study thus sought a panacea in developing a cyber-security architecture to improve the cyber security of remote laboratories with the case of Makerere University iLabs (iLabs@Mak). The research study focused on generating a threat model for the online laboratories at Makerere University, followed by security requirements generation which was later followed by the design of cyber security physical, technical and administrative controls (safeguards) that together formed a cybersecurity architecture for the remote laboratories. The developed cyber security architecture was then validated by use of a Likert scale to ascertain its fitness to improve the cyber security of remote laboratories. The research study was conducted under the umbrella of design science research methodology and deployed a blend of qualitative and quantitative data collection methods that were employed virtually through phone calls and online forms/questionnaires. The sample size of the research study was controlled by use of Krejcie and Morgan’s formula/table. All the participants of this research were selected by purposive sampling technique because the research required very specific qualities and qualifications from the participants. The output of this research was a cyber-security architecture constituting of technical, administrative and physical controls that are expected to improve the cyber security of online laboratories, upon implementation.
    URI
    http://hdl.handle.net/10570/11939
    Collections
    • School of Computing and Informatics Technology (CIT) Collection

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak IRCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV