CHAPTER ONE
1.1 Background of the Study
Cybersecurity threats, including phishing attacks, are a growing concern for organizations worldwide. Phishing involves the use of deceptive emails or websites to steal sensitive information such as passwords, financial data, and intellectual property. Nigerian companies, particularly IT firms, are prime targets due to their reliance on digital systems and sensitive client data.
Artificial Intelligence (AI)-driven phishing detection systems offer a proactive solution to this challenge. These systems use machine learning algorithms to identify phishing patterns, analyze email content, and detect anomalies in real-time. Unlike traditional methods, AI systems are adaptive and can respond to emerging phishing techniques, making them more effective in safeguarding digital assets.
In Abuja, IT firms are at the forefront of digital innovation, but they remain vulnerable to phishing attacks. This study examines the role of AI-driven phishing detection systems in protecting IT firms in Abuja, focusing on their effectiveness, challenges, and impact.
1.2 Statement of the Problem
Despite advancements in cybersecurity, IT firms in Abuja face persistent phishing threats that compromise sensitive data and disrupt operations. Traditional detection methods are often insufficient for countering sophisticated phishing attacks. This study investigates how AI-driven phishing detection systems can address these challenges.
1.3 Aim and Objectives of the Study
The aim of this study is to evaluate the role of AI-driven phishing detection in protecting IT firms in Abuja. The specific objectives are:
1.4 Research Questions
1.5 Research Hypotheses
1.6 Significance of the Study
This study provides insights into the role of AI in combating phishing attacks, offering recommendations for improving cybersecurity strategies in Nigerian IT firms. It contributes to the broader discourse on AI’s application in cybersecurity.
1.7 Scope and Limitation of the Study
The study focuses on IT firms in Abuja and their use of AI-driven phishing detection systems. It excludes other cybersecurity threats and companies outside the IT sector. Limitations include access to proprietary security systems and data.
1.8 Definition of Terms
Abstract
This study is on an investigation into the relationship between teaching methods and academic performance of se...
Abstract
This project work is designed to find out appraisal of problems and prospect of peasant farming in Uhunmwonde L...
ABSTRACT
This study was carried out to was to investigate godfatherism and electoral process in Nigeria...
Abstract: The impact of workplace learning on adult employees' performance is an essential area of study in understanding the benefits of...
ABSTRACT: The Role of Cultural Sensitivity Training in Vocational Settings examines the importance of cultural competence in vocational education a...
Abstract
The study had four (4) specific objectives, four (4) research questions and four null hypotheses as a guide. The study made use...
EXCERPT FROM THE STUDY
"Western culture is an extremely broad term that refers to the social norms, belief systems, traditions, cust...
ABSTRACT
The study of the biology of three fish species; Tilapia zillii, Clarias gariepinus and Synodontis clarias with reference to thei...
ASBTRACT
This project investigates “The Impacts of Pricing in Marketing of Coke Drinks in Enugu S...
EXCERPT FROM THE STUDY
Academic libraries are primarily committed to providing such library resources and services as wo...