Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/4603
Title: Enhancing Information Security at RZM Mrowa: Strategies, Technologies and Recommendations
Authors: Chakumarani, Rumbidzai
Keywords: information security
vulnerabilities
security policies
strategies and technologies
information security threats and challenges
Issue Date: 2025
Publisher: Africa University
Citation: Chakumarani, R. (2025). Enhancing information security at RZM Mrowa: Strategies, technologies and recommendations (Undergraduate dissertation). Africa University, Mutare.
Abstract: This research delves into the critical area of information security at RZM Murowa, aiming to assess the effectiveness of existing measures and technologies, identifying vulnerabilities, and proposing strategies to enhance its security posture. Qualitative research method, was used in this study to provide a comprehensive understanding of the current state of information security at RZM Murowa. The research began with a thorough review of existing security policies, procedures, and technical documentation. This analysis helped in the identification of gaps or weaknesses in the current security framework. Subsequently, interviews and observations were conducted with key stakeholders, including IT personnel, security experts, and employees, to gain insights into their perceptions of security risks and challenges. The researcher gathered vast amounts of data, in the form of text and audio files, afterwards the researcher presented and analysed the research findings in order to find the areas that needed improvement. Based on the findings of this study, the research proposed strategies to enhance information security at RZM Murowa. These strategies may include; strengthening Access Controls, enhancing Network Security, improving Endpoint Security, raising Employee Awareness, Incident Response Planning and leveraging Emerging Technologies. If the company adopts and implement these strategies, RZM Murowa can significantly enhance its information security posture, protect its critical assets, and mitigate the risks associated with information security threats.
URI: http://localhost:8080/xmlui/handle/123456789/4603
Appears in Collections:Department of Artificial Intelligence, Software Engineering and Computer Science



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.