CHAPTER ONE
1.1 Background of the Study
Cybersecurity threats, including phishing attacks, are a growing concern for organizations worldwide. Phishing involves the use of deceptive emails or websites to steal sensitive information such as passwords, financial data, and intellectual property. Nigerian companies, particularly IT firms, are prime targets due to their reliance on digital systems and sensitive client data.
Artificial Intelligence (AI)-driven phishing detection systems offer a proactive solution to this challenge. These systems use machine learning algorithms to identify phishing patterns, analyze email content, and detect anomalies in real-time. Unlike traditional methods, AI systems are adaptive and can respond to emerging phishing techniques, making them more effective in safeguarding digital assets.
In Abuja, IT firms are at the forefront of digital innovation, but they remain vulnerable to phishing attacks. This study examines the role of AI-driven phishing detection systems in protecting IT firms in Abuja, focusing on their effectiveness, challenges, and impact.
1.2 Statement of the Problem
Despite advancements in cybersecurity, IT firms in Abuja face persistent phishing threats that compromise sensitive data and disrupt operations. Traditional detection methods are often insufficient for countering sophisticated phishing attacks. This study investigates how AI-driven phishing detection systems can address these challenges.
1.3 Aim and Objectives of the Study
The aim of this study is to evaluate the role of AI-driven phishing detection in protecting IT firms in Abuja. The specific objectives are:
1.4 Research Questions
1.5 Research Hypotheses
1.6 Significance of the Study
This study provides insights into the role of AI in combating phishing attacks, offering recommendations for improving cybersecurity strategies in Nigerian IT firms. It contributes to the broader discourse on AI’s application in cybersecurity.
1.7 Scope and Limitation of the Study
The study focuses on IT firms in Abuja and their use of AI-driven phishing detection systems. It excludes other cybersecurity threats and companies outside the IT sector. Limitations include access to proprietary security systems and data.
1.8 Definition of Terms
BACKGROUND TO STUDY
For any organization to function very effectively is it big or small, the welfare o...
ABSTRACT
This study is aimed at identifying the problems of development-policy making in Obudu local government area of...
Background of the Study
Automated Teller Machines, sometimes known as ATMs, are machines that allow clients of ba...
Statement Of The Problem
Malaria has become very common and is increasing in an uncontrolled way throug...
ABSTRACT
This work examined the contributions of the insurance industry to the gross domestic product (GDP) in Nigeria. Data for the stud...
ABSTRACT: This study investigates the effectiveness of blended learning models in technical education, highlighting the integration of online...
ABSTRACT
The research topic on “The Role Of Financial Control In The Public Sector, a case study of ministry...
Abstract:
This study investigates the effect of employee motivation on management accounting outcomes i...
Background Of The Study
Education is a tool for the sustainable development of any economy (Oyitso &...
EXCERPT FROM THE STUDY
The significance of school plant planning is inestimable in realising educational goals and objec...