CHAPTER ONE
1.1 Background of the Study
Cybersecurity threats, including phishing attacks, are a growing concern for organizations worldwide. Phishing involves the use of deceptive emails or websites to steal sensitive information such as passwords, financial data, and intellectual property. Nigerian companies, particularly IT firms, are prime targets due to their reliance on digital systems and sensitive client data.
Artificial Intelligence (AI)-driven phishing detection systems offer a proactive solution to this challenge. These systems use machine learning algorithms to identify phishing patterns, analyze email content, and detect anomalies in real-time. Unlike traditional methods, AI systems are adaptive and can respond to emerging phishing techniques, making them more effective in safeguarding digital assets.
In Abuja, IT firms are at the forefront of digital innovation, but they remain vulnerable to phishing attacks. This study examines the role of AI-driven phishing detection systems in protecting IT firms in Abuja, focusing on their effectiveness, challenges, and impact.
1.2 Statement of the Problem
Despite advancements in cybersecurity, IT firms in Abuja face persistent phishing threats that compromise sensitive data and disrupt operations. Traditional detection methods are often insufficient for countering sophisticated phishing attacks. This study investigates how AI-driven phishing detection systems can address these challenges.
1.3 Aim and Objectives of the Study
The aim of this study is to evaluate the role of AI-driven phishing detection in protecting IT firms in Abuja. The specific objectives are:
1.4 Research Questions
1.5 Research Hypotheses
1.6 Significance of the Study
This study provides insights into the role of AI in combating phishing attacks, offering recommendations for improving cybersecurity strategies in Nigerian IT firms. It contributes to the broader discourse on AI’s application in cybersecurity.
1.7 Scope and Limitation of the Study
The study focuses on IT firms in Abuja and their use of AI-driven phishing detection systems. It excludes other cybersecurity threats and companies outside the IT sector. Limitations include access to proprietary security systems and data.
1.8 Definition of Terms
Background of the study:
Intergenerational height variation is a well-recognized indicator of nutritional,...
Background of the Study
Gender equality in education is a cornerstone for societal development, and schools play a pivotal role in shapin...
Background of the Study
Performance-based accounting is a financial management approach that aligns res...
ABSTRACT: THE CHALLENGES OF ETHICS AND PROFESSIONALISM IN GOVERNMENTAL ACCOUNTING SERVICES
This study explores the challenges of ethics a...
Background of the Study
Agriculture is a key sector in Apa LGA, contributing to the livelihood of many res...
ABSTRACT
The purpose of this study was to assess the availability and implementation of safety precautions in day-care centers in Gombe S...
ABSTRACT: THE ROLE OF ACCOUNTING FOR PUBLIC-PRIVATE COLLABORATIONS AND JOINT VENTURES
This study examines the role of accounting in publi...
Background of the Study
Understanding customer behavior is critical for the success of any financial institution. In Islami...
ABSTRACT
The study investigated the effects of 5E-Learning Model on Creativity, Performance and Retention in Ecology among Secondary Scho...
Background of the Study
The composition of a company’s board of directors is a critical determinant of its corpora...