CHAPTER ONE
1.1 Background of the Study
Social engineering attacks exploit human psychology to deceive individuals into divulging sensitive information or performing actions that compromise security. Common forms of social engineering include phishing, pretexting, baiting, and impersonation. Nigerian cybersecurity agencies are at the forefront of mitigating these threats, but the increasing sophistication of social engineering techniques poses significant challenges.
Artificial Intelligence (AI) has emerged as a powerful tool in combating social engineering attacks. AI systems analyze behavioral patterns, detect anomalies in communication, and flag potential phishing attempts. By leveraging machine learning, these systems can identify subtle indicators of manipulation that humans might overlook. In Kano State, where cybersecurity agencies are tasked with safeguarding critical infrastructure, the role of AI in combating social engineering attacks is crucial.
This study examines the impact of AI in combating social engineering attacks, focusing on its application within Nigerian cybersecurity agencies in Kano State.
1.2 Statement of the Problem
Social engineering attacks have become a persistent threat to cybersecurity, exploiting human vulnerabilities rather than technological flaws. Nigerian cybersecurity agencies in Kano State face challenges in effectively identifying and mitigating these attacks. This study investigates how AI technologies can enhance the detection and prevention of social engineering attacks.
1.3 Aim and Objectives of the Study
The aim of this study is to assess the impact of AI in combating social engineering attacks in Nigerian cybersecurity agencies. The specific objectives are:
1.4 Research Questions
1.5 Research Hypotheses
1.6 Significance of the Study
This study provides valuable insights into the role of AI in addressing the growing challenge of social engineering attacks. It offers practical recommendations for Nigerian cybersecurity agencies, contributing to improved cybersecurity frameworks.
1.7 Scope and Limitation of the Study
The study focuses on Nigerian cybersecurity agencies in Kano State and their use of AI technologies to combat social engineering attacks. It does not cover other cyber threats or regions. Limitations include access to sensitive cybersecurity data and the level of AI adoption.
1.8 Definition of Terms
ABSTRACT
It has being observed over time that there are problems associated with the quality of designs and execution of jobs within the...
Background of the Study
Accessibility in library services is essential to ensure that all members of the community can b...
Background of the Study
Word-of-mouth marketing (WOM) is one of the oldest and most po...
ABSTRACT
State recognition is one of the oldest practice in international relations, and one of the most vexed concepts in international...
Background of the Study
Youth unemployment remains a significant challenge in Mangu LGA, affecting both...
Background of the study
Adult literacy programs have been recognized not only for their role in educational advancement but also for thei...
Background of the Study
The gut microbiome, consisting of trillions of microorganisms living in the human gastrointestinal...
Background of the Study
Financial risk reporting is a critical component of corporate governance and financial transpare...
Background of the Study
Virtual reality (VR) is an emerging technology that has transformed various fields, including ed...
Background of the Study
Digitalization has revolutionized the financial industry, transforming traditional banking practic...