• Login
    View Item 
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A forensic model for investigating cybersecurity in government cloud artifacts: case of KCCA and NITA – U

    Thumbnail
    View/Open
    Master's dissertation (3.341Mb)
    Date
    2024-11
    Author
    Ssempanyi, Brian
    Metadata
    Show full item record
    Abstract
    The study's main objective was to develop a forensic model that supports cyber security investigation in government cloud artefacts at National Information Technology Authority – Uganda (NITA-U). This study sought to find an appropriate model to counter security challenges to using Government cloud artefacts which play a crucial role in offering practical experiments to engineering classes to offset the limitations and burdens of traditional cloud artefacts. The following specific objectives guided the study; identify the various security risks associated with cloud computing; investigate the requirements for developing a forensic model for investigating cyber security in government cloud artefacts; design a forensic model for investigating cyber security in government cloud artefacts; and test and validate the designed forensic model in investigating cyber security in government cloud artefacts. The research study was conducted under the umbrella of design science research methodology and deployed a blend of qualitative and quantitative data collection methods that were employed virtually through phone calls and online forms/questionnaires. All the participants of this research were selected purposively selected because the research required very specific qualities and qualifications from the participants. This research output was a cyber-security architecture constituting technical, administrative, and physical controls expected to improve the cyber security of cloud artefacts upon implementation. The developed cyber security architecture was validated to ascertain its fitness to improve the cyber security of cloud artefacts. The study recommends that public agencies should ensure they take on cloud computing that matches available resources. On the other hand, agency managers are also encouraged to implement interventions that directly influence the relevant and significant model components identified by this study.
    URI
    http://hdl.handle.net/10570/14078
    Collections
    • School of Computing and Informatics Technology (CIT) Collection

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak IRCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV