{"id":3739,"date":"2023-12-04T14:37:20","date_gmt":"2023-12-04T14:37:20","guid":{"rendered":"https:\/\/sgs.kibu.ac.ke\/?p=3739"},"modified":"2025-11-26T04:35:31","modified_gmt":"2025-11-26T04:35:31","slug":"a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/","title":{"rendered":"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3739\" class=\"elementor elementor-3739\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5a3cecb9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a3cecb9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-98630bc\" data-id=\"98630bc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e068ad8 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e068ad8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3128d7fb\" data-id=\"3128d7fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5db4c235\" data-id=\"5db4c235\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-745352b4 elementor-section-height-min-height elementor-section-items-stretch elementor-section-boxed elementor-section-height-default\" data-id=\"745352b4\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32dd6be0\" data-id=\"32dd6be0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5cd9ad3d elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default\" data-id=\"5cd9ad3d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-128760f3\" data-id=\"128760f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b3d0b1 elementor-widget elementor-widget-heading\" data-id=\"2b3d0b1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Student\u2019s Name: <br>\nPatrick Omondi Kwanya<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3d152a52\" data-id=\"3d152a52\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cdcb553 elementor-widget elementor-widget-heading\" data-id=\"6cdcb553\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Supervisors:<br>\n1. Alice Nambiro<br>\n2. Anthony Luvanda\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5b1b0f66\" data-id=\"5b1b0f66\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5eed93e9 elementor-widget elementor-widget-heading\" data-id=\"5eed93e9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Master of Science in Information Technology<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-292db070 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"292db070\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-23b59a02\" data-id=\"23b59a02\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-575331bd elementor-widget elementor-widget-spacer\" data-id=\"575331bd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-265ae15c\" data-id=\"265ae15c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1ca800cf elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"1ca800cf\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5519eb24\" data-id=\"5519eb24\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4165d7dd elementor-widget elementor-widget-heading\" data-id=\"4165d7dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ABSTRACT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b0179d0 elementor-widget elementor-widget-text-editor\" data-id=\"7b0179d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lately, the education sector had become a prime target for cyber-attacks. This was mainly because it had a lot of valuable data; it was potentially an easy target; it provided access to a larger network; and had a lot of users. Most of the secondary schools had been equipped with computers and computing devices. Majority of these schools had internet connectivity, making them vulnerable to cyber-attack. The vulnerability was as a result of them lacking resources and attention to cybersecurity. They had weak application security, weak endpoint security, and weak patch cadence. More had to be done to address the above-named issues and to promote cybersecurity in secondary schools. One way of addressing this was the development of cybersecurity framework. The purpose of the study was to determine the state and challenges of cybersecurity in secondary schools in Kenya and to develop a framework to address the same. This study was achieved by establishing the state of cybersecurity in secondary schools in Kenya, by determining the prevailing challenges encountered in using computer security systems in secondary schools in Kenya and by developing a cybersecurity framework for the management of computer systems in secondary schools in Kenya. Both descriptive and correlational research designs were used in this research study. The study adopted simple random sampling, stratified and purposive sampling. The study population included schools\u2019 administrators and the teachers in charge of ICT in secondary schools in West Pokot County. They were the people who interacted mostly with the school\u2019s computer systems and policies. The sample sizes of 88 teachers in charge of ICT and 12 schools\u2019 administrators were used in the research study. Both questionnaires and interviews schedule were administered for data collection. Interview schedule enabled researcher to ensure that views and options were clarified especially the once which could not be captured by the questionnaires. Descriptive and inferential statistics were used in the data analysis. The results were presented through tables. The research study was carried out in secondary schools in West Pokot County. The developed cybersecurity framework would be useful to secondary schools in West Pokot County and beyond. From the analysis, most of the secondary schools had computers that were in use; Staffs were allowed to carry their computing devices to the schools, and they connected them to the schools&#8217; network in order to access internet; there was no segmentation of \u00a0network to allow staffs have their own separate network access; some schools had IoT devices with no network segmentations; most of the schools had ways to ensure data confidentiality and data availability; most schools lack data recovery plan, means to provide endpoint security, means to provide mobile security and means to provide website security. The major challenges in using computer security systems in secondary schools is lack of enough budget to address the issues of cybersecurity. Finally, there existed a positive moderate relationship between the prevailing challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-108dc3c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"108dc3c1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32a1f1b5\" data-id=\"32a1f1b5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Student\u2019s Name: Patrick Omondi Kwanya Supervisors: 1. Alice Nambiro 2. Anthony Luvanda Master of Science in Information Technology ABSTRACT Lately, the education sector had become a prime target for cyber-attacks. This was mainly because it had a lot of valuable data; it was potentially an easy target; it provided access to a larger network; and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3739","post","type-post","status-publish","format-standard","hentry","category-theses"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya - School of Graduate Studies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya - School of Graduate Studies\" \/>\n<meta property=\"og:description\" content=\"Student\u2019s Name: Patrick Omondi Kwanya Supervisors: 1. Alice Nambiro 2. Anthony Luvanda Master of Science in Information Technology ABSTRACT Lately, the education sector had become a prime target for cyber-attacks. This was mainly because it had a lot of valuable data; it was potentially an easy target; it provided access to a larger network; and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Graduate Studies\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-04T14:37:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T04:35:31+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\"},\"headline\":\"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya\",\"datePublished\":\"2023-12-04T14:37:20+00:00\",\"dateModified\":\"2025-11-26T04:35:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/\"},\"wordCount\":512,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"articleSection\":[\"Theses\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/\",\"name\":\"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya - School of Graduate Studies\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\"},\"datePublished\":\"2023-12-04T14:37:20+00:00\",\"dateModified\":\"2025-11-26T04:35:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/sgs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"name\":\"School of Graduate Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\",\"name\":\"School of Graduate Studies\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"width\":1220,\"height\":1100,\"caption\":\"School of Graduate Studies\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/sgs\"],\"url\":\"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya - School of Graduate Studies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/","og_locale":"en_US","og_type":"article","og_title":"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya - School of Graduate Studies","og_description":"Student\u2019s Name: Patrick Omondi Kwanya Supervisors: 1. Alice Nambiro 2. Anthony Luvanda Master of Science in Information Technology ABSTRACT Lately, the education sector had become a prime target for cyber-attacks. This was mainly because it had a lot of valuable data; it was potentially an easy target; it provided access to a larger network; and [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/","og_site_name":"School of Graduate Studies","article_published_time":"2023-12-04T14:37:20+00:00","article_modified_time":"2025-11-26T04:35:31+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8"},"headline":"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya","datePublished":"2023-12-04T14:37:20+00:00","dateModified":"2025-11-26T04:35:31+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/"},"wordCount":512,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"articleSection":["Theses"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/","url":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/","name":"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya - School of Graduate Studies","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#website"},"datePublished":"2023-12-04T14:37:20+00:00","dateModified":"2025-11-26T04:35:31+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/sgs\/a-cybersecurity-framework-for-the-management-of-computer-systems-security-in-secondary-schools-in-kenya\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/sgs\/"},{"@type":"ListItem","position":2,"name":"A Cybersecurity Framework for The Management of Computer Systems Security in Secondary Schools in Kenya"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/sgs\/#website","url":"https:\/\/kibu.ac.ke\/sgs\/","name":"School of Graduate Studies","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/sgs\/#organization","name":"School of Graduate Studies","url":"https:\/\/kibu.ac.ke\/sgs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","contentUrl":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","width":1220,"height":1100,"caption":"School of Graduate Studies"},"image":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/sgs"],"url":"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/3739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/comments?post=3739"}],"version-history":[{"count":3,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/3739\/revisions"}],"predecessor-version":[{"id":7979,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/3739\/revisions\/7979"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/media?parent=3739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/categories?post=3739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/tags?post=3739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}