CHAPTER ONE
1.1 Background of the Study
Social engineering attacks exploit human psychology to deceive individuals into divulging sensitive information or performing actions that compromise security. Common forms of social engineering include phishing, pretexting, baiting, and impersonation. Nigerian cybersecurity agencies are at the forefront of mitigating these threats, but the increasing sophistication of social engineering techniques poses significant challenges.
Artificial Intelligence (AI) has emerged as a powerful tool in combating social engineering attacks. AI systems analyze behavioral patterns, detect anomalies in communication, and flag potential phishing attempts. By leveraging machine learning, these systems can identify subtle indicators of manipulation that humans might overlook. In Kano State, where cybersecurity agencies are tasked with safeguarding critical infrastructure, the role of AI in combating social engineering attacks is crucial.
This study examines the impact of AI in combating social engineering attacks, focusing on its application within Nigerian cybersecurity agencies in Kano State.
1.2 Statement of the Problem
Social engineering attacks have become a persistent threat to cybersecurity, exploiting human vulnerabilities rather than technological flaws. Nigerian cybersecurity agencies in Kano State face challenges in effectively identifying and mitigating these attacks. This study investigates how AI technologies can enhance the detection and prevention of social engineering attacks.
1.3 Aim and Objectives of the Study
The aim of this study is to assess the impact of AI in combating social engineering attacks in Nigerian cybersecurity agencies. The specific objectives are:
1.4 Research Questions
1.5 Research Hypotheses
1.6 Significance of the Study
This study provides valuable insights into the role of AI in addressing the growing challenge of social engineering attacks. It offers practical recommendations for Nigerian cybersecurity agencies, contributing to improved cybersecurity frameworks.
1.7 Scope and Limitation of the Study
The study focuses on Nigerian cybersecurity agencies in Kano State and their use of AI technologies to combat social engineering attacks. It does not cover other cyber threats or regions. Limitations include access to sensitive cybersecurity data and the level of AI adoption.
1.8 Definition of Terms
Over the years, paper-based system for information managem...
ABSTRACT
This study was carried out on impact of staff training and development on employees performanc...
ABSTRACT
The purpose of this study was to assess knowledge of reproductive health (RH) among students in Colleges of Education in North E...
BACKGROUND OF THE STUDY
The history of planning is old as man himself planning had started from the ancient era during t...
Background of the Study
The Nigerian government has played a key role in the adoption and implementation of International F...
Background of the study
Journalists who work professionally in Nigeria are often confronted with comple...
Background to the Study
The ability of an organization's or institution's administrators to coo...
THE INFLUENCE OF DIGITAL INNOVATION ON BUSINESS STRATEGIES
This study aims to: (1) explore the relationship between digital innovation an...
Abstract: THE EFFECT OF INVESTIGATIVE ACCOUNTING METHODS FOR FORENSIC DATA ANALYSIS
This study examines the impact of investigative accou...
ABSTRACT
This project work was undertaken to survey the influence of socio-economic background in the a...