dc.description.abstract |
The study determines how wireless network LAN’s encryption and authentication mitigate security
risks and protect sensitive data's confidentiality, integrity, and availability. This study uses the Ministry
of Finance and Planning in Dodoma as a case study to examine how authentication and encryption
procedures secure WLANs in public Institutions. Descriptive study design was used to collect data
through questionnaires. This study collected objective-related data using quantitative methods. The
study targeted management officials, chiefs of departments, and other ministry personnel because
they use Wi-Fi networks most in their regular job. Simple random sampling was used in the
investigation. The quantitative data was collected through questionnaire with closed-ended questions.
The data was analyzed quantitatively. The study sampled 90 randomly selected employees from the
target population. The analysis reveals that the Ministry of Finance and Planning has successfully
deployed authentication systems, mostly employing WPA2-Enterprise and 802.1X protocols. The
study revealed the presence of encryption mechanisms, specifically WPA2-Personal and WPA2
Enterprise, which provide data encryption for wireless LAN transmissions, as indicated by the
available data. The study revealed the implementation of encryption methods, specifically WPA2
Personal and WPA2-Enterprise. It is also established in the study that user awareness plays a key
role in mitigating security risks for wireless LAN users in public institutions. Nevertheless, the
existence of gadgets that utilize obsolete encryption techniques raises a substantial apprehension.
The research's conclusions shed light on how authentication and encryption algorithms are currently
being used in the wireless LAN network at Dodoma's Ministry of Finance and Planning. Although the
Institution had taken significant steps to improve network security, there are still some areas that
require improvement. The study's recommendations offer a tactical approach for enhancing overall
security, ensuring the confidentiality, integrity, and accessibility of critical data in a situation vulnerable
to dynamic cyberattacks. |
en_US |