[ad_1]
A pc science knowledgeable, Prof. Rasheed Jimoh, has referred to as for the introduction of cybersecurity specialised packages in Nigerian universities to deal with rising incidences of cybercrimes within the nation.
Jimoh who’s a Professor within the Division of Pc Science, College of Ilorin made the decision in Ilorin throughout his paper presentation on the Unilorin 239th Inaugural Lecture titled: “Deconstructing the Crawling Mindsets: Combating Safety Challenges of Internet-Centric Computing.” Jimoh mentioned having cybersecurity packages within the universities would assist the nation to construct the capability to battle cybercrimes.
He additionally urged the Federal Authorities to assist the usage of biometric know-how in public locations to examine cybercrime actions within the nation.
In keeping with him, the usage of fingerprint authentication for all academic processes inside the college system will forestall circumstances of impersonation and campus insecurity.
Significance of biometrics
Whereas noting that the biometric algorithm selects the distinctive traits of every fingerprint, encrypts this knowledge, and saves it as a template, he mentioned:
- “College students’ biometrics can simply be collected from the Joint Admission and Matriculation Board, JAMB’s Central Admission Processing System (CAPS). We should perceive the truth that integration of ICT inside a Internet-Centric computing atmosphere for seamless operations is just not contestable until we accept crawling at a jet age with critical implications of not catching up with our opponents and the remainder of the world.
- “Thus, crawling within the digital period when the remainder of the world is shifting at a really quick tempo, can by no means be a suitable choice.”
The Prof. added that the choice left for the nation was to get up to the calls and discover a method of eliminating or decreasing the cybersecurity challenges related to operations within the rising Internet-Centric computing atmosphere.
This, he mentioned, was via the adoption of data safety administration ethics and requirements coupled with the implementation of appropriate cybersecurity strategies.
He famous that these strategies are able to attaining dependable authentication, safety danger mitigation, secured sharing of data and assets, intrusion-free operations, and integrity-proven cyber actions.
The don mentioned subtle authentication strategies must be inspired to ensure the safety of each card and cardless monetary transactions, to forestall all related monetary frauds. He urged the federal government to double its efforts and supply funds for aggressive sensitization on the necessity for cultural adaptation to the rising digital period.
[ad_2]
Source link