{"id":7333,"date":"2025-02-25T13:02:41","date_gmt":"2025-02-25T13:02:41","guid":{"rendered":"https:\/\/scai.kibu.ac.ke\/?p=7333"},"modified":"2025-12-24T02:03:04","modified_gmt":"2025-12-24T02:03:04","slug":"a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/","title":{"rendered":"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7333\" class=\"elementor elementor-7333\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-424826c7 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"424826c7\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42d366c0\" data-id=\"42d366c0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ce0230a elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"3ce0230a\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ba0c17b elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"2ba0c17b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e78b234\" data-id=\"4e78b234\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7972492b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7972492b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-56b373b8 elementor-invisible\" data-id=\"56b373b8\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2cf59939 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"2cf59939\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2023<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-509c638c elementor-invisible\" data-id=\"509c638c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7369250c elementor-widget elementor-widget-heading\" data-id=\"7369250c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KIBU Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-782d0fd2 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"782d0fd2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Dr. Alice Nambiro<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6f6aecd8 elementor-invisible\" data-id=\"6f6aecd8\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e5914a2 elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"6e5914a2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/www.allresearchjournal.com\/archives\/2023\/vol9issue10\/PartB\/9-9-48-250.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3093e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3093e6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6488eb8c elementor-invisible\" data-id=\"6488eb8c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f92d378 elementor-widget elementor-widget-heading\" data-id=\"2f92d378\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fdd90bc elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4fdd90bc\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The education sector over time had experienced numerous computer cybersecurity challenges. These challenges made them became an easy target for the cybersecurity criminals. Nowadays, most of the secondary schools in Kenya had been equipped with computers and computing devices. Most of these schools had internet connectivity too making them vulnerable to cyber-attack. The vulnerability was also as a result of them lacking resources and attention to cybersecurity due to cybersecurity challenges they experienced. They had weak application security systems, weak endpoint security systems, and weak patch cadence. The study aimed at establishing the computer systems cybersecurity challenges in secondary schools in Kenya. The study was done in West Pokot County. From the finindgs- staffs were allowed to carry their computing devices to the schools, and they connected them to the schools&#8217; network in order to access internet; there was no segmentation of network to allow staffs have their own separate network access; some schools had IoT devices with no network segmentations; most schools lack data recovery plan, means to provide endpoint security, means to provide mobile security and means to provide website security. Lack of finance and budget, IT personnel, and user awareness contributed largely to these challenges. By establishing the computer systems cybersecurity challenges encountered, the secondary schools therefore, will find a solution to address them especially by looking at the contributors to the aforementioned challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2023 KIBU Authors Dr. Alice Nambiro VIEW ON PUBLISHER SITE Abstract The education sector over time had experienced numerous computer cybersecurity challenges. These challenges made them became an easy target for the cybersecurity criminals. Nowadays, most of the secondary schools in Kenya had been equipped with computers and computing devices. Most of these schools had [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-7333","post","type-post","status-publish","format-standard","hentry","category-research-list"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county - School of Computing &amp; Informatics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county - School of Computing &amp; Informatics\" \/>\n<meta property=\"og:description\" content=\"2023 KIBU Authors Dr. Alice Nambiro VIEW ON PUBLISHER SITE Abstract The education sector over time had experienced numerous computer cybersecurity challenges. These challenges made them became an easy target for the cybersecurity criminals. Nowadays, most of the secondary schools in Kenya had been equipped with computers and computing devices. Most of these schools had [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Computing &amp; Informatics\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T13:02:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T02:03:04+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\"},\"headline\":\"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county\",\"datePublished\":\"2025-02-25T13:02:41+00:00\",\"dateModified\":\"2025-12-24T02:03:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/\"},\"wordCount\":255,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"articleSection\":[\"Research List\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/\",\"name\":\"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county - School of Computing &amp; Informatics\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\"},\"datePublished\":\"2025-02-25T13:02:41+00:00\",\"dateModified\":\"2025-12-24T02:03:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"School Publications\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/school-publications\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"name\":\"School of Computing &amp; Informatics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\",\"name\":\"School of Computing &amp; Informatics\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"width\":1024,\"height\":923,\"caption\":\"School of Computing &amp; Informatics\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/scai\"],\"url\":\"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county - School of Computing &amp; Informatics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/","og_locale":"en_US","og_type":"article","og_title":"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county - School of Computing &amp; Informatics","og_description":"2023 KIBU Authors Dr. Alice Nambiro VIEW ON PUBLISHER SITE Abstract The education sector over time had experienced numerous computer cybersecurity challenges. These challenges made them became an easy target for the cybersecurity criminals. Nowadays, most of the secondary schools in Kenya had been equipped with computers and computing devices. Most of these schools had [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/","og_site_name":"School of Computing &amp; Informatics","article_published_time":"2025-02-25T13:02:41+00:00","article_modified_time":"2025-12-24T02:03:04+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d"},"headline":"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county","datePublished":"2025-02-25T13:02:41+00:00","dateModified":"2025-12-24T02:03:04+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/"},"wordCount":255,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"articleSection":["Research List"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/","url":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/","name":"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county - School of Computing &amp; Informatics","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/#website"},"datePublished":"2025-02-25T13:02:41+00:00","dateModified":"2025-12-24T02:03:04+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/scai\/a-computer-systems-cybersecurity-challenges-encountered-by-secondary-schools-in-kenya-a-case-study-of-west-pokot-county\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/scai\/"},{"@type":"ListItem","position":2,"name":"School Publications","item":"https:\/\/kibu.ac.ke\/scai\/school-publications\/"},{"@type":"ListItem","position":3,"name":"A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/scai\/#website","url":"https:\/\/kibu.ac.ke\/scai\/","name":"School of Computing &amp; Informatics","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/scai\/#organization","name":"School of Computing &amp; Informatics","url":"https:\/\/kibu.ac.ke\/scai\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","contentUrl":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","width":1024,"height":923,"caption":"School of Computing &amp; Informatics"},"image":{"@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/scai"],"url":"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/comments?post=7333"}],"version-history":[{"count":3,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7333\/revisions"}],"predecessor-version":[{"id":11369,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7333\/revisions\/11369"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/media?parent=7333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/categories?post=7333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/tags?post=7333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}