CHAPTER ONE
1.1 Background of the Study
Social engineering attacks exploit human psychology to deceive individuals into divulging sensitive information or performing actions that compromise security. Common forms of social engineering include phishing, pretexting, baiting, and impersonation. Nigerian cybersecurity agencies are at the forefront of mitigating these threats, but the increasing sophistication of social engineering techniques poses significant challenges.
Artificial Intelligence (AI) has emerged as a powerful tool in combating social engineering attacks. AI systems analyze behavioral patterns, detect anomalies in communication, and flag potential phishing attempts. By leveraging machine learning, these systems can identify subtle indicators of manipulation that humans might overlook. In Kano State, where cybersecurity agencies are tasked with safeguarding critical infrastructure, the role of AI in combating social engineering attacks is crucial.
This study examines the impact of AI in combating social engineering attacks, focusing on its application within Nigerian cybersecurity agencies in Kano State.
1.2 Statement of the Problem
Social engineering attacks have become a persistent threat to cybersecurity, exploiting human vulnerabilities rather than technological flaws. Nigerian cybersecurity agencies in Kano State face challenges in effectively identifying and mitigating these attacks. This study investigates how AI technologies can enhance the detection and prevention of social engineering attacks.
1.3 Aim and Objectives of the Study
The aim of this study is to assess the impact of AI in combating social engineering attacks in Nigerian cybersecurity agencies. The specific objectives are:
1.4 Research Questions
1.5 Research Hypotheses
1.6 Significance of the Study
This study provides valuable insights into the role of AI in addressing the growing challenge of social engineering attacks. It offers practical recommendations for Nigerian cybersecurity agencies, contributing to improved cybersecurity frameworks.
1.7 Scope and Limitation of the Study
The study focuses on Nigerian cybersecurity agencies in Kano State and their use of AI technologies to combat social engineering attacks. It does not cover other cyber threats or regions. Limitations include access to sensitive cybersecurity data and the level of AI adoption.
1.8 Definition of Terms
BACKGROUND OF THE STUDY
Biotechnology is one of the most important scientific revolutions of the twenty first cen...
BACKGROUND OF THE STUDY
Progression is the major objective of an organisation. An organisation need to progress financia...
ABSTRACT
This research work was focused on investigation on the use of budgeting and budgetary control as tools for accountability in gov...
Background of the Study
A community's general health can be inferred from the health and well-being...
Abstract
Property management is a vital aspect of real estate profession. To a non-professional estate...
ABSTRACT
This study was carried out to examine the autonomy of local government in Nigeria: issues...
Abstract: This research examines the impact of learning disabilities on adult education. The study aimed to investigate how learning disabilit...
1.1 Background of the Study
Agricultural productivity in Nigeria is heavily reliant on accurate data for land management...
AN ASSESSMENT OF SUSTAINABILITY REPORTING IN INTERNATIONAL ACCOUNTING CONTEXTS
ABSTRACT
The study aims to assess (1) the extent...
BACKGROUND TO THE STUDY
A global study and research on Pentecostal pentecostal churches is an on-going assignment becaus...