Background of the Study:
Network forensics is an essential aspect of cybercrime investigations, especially in academic institutions like Federal University, Dutsin-Ma, Katsina State. Network forensics involves the collection, analysis, and preservation of data traffic to identify, understand, and attribute cybercrimes that occur within a network (Xie et al., 2024). Universities, which are often targeted by cybercriminals due to the large amounts of sensitive academic and personal data they house, need robust network forensics capabilities to track and investigate incidents of unauthorized access, data breaches, and cyber-attacks.
Given the increasing sophistication of cybercriminals, traditional forensic methods are no longer sufficient for identifying and prosecuting offenders. A more advanced, data-driven approach is needed to monitor network traffic in real time, capture and analyze packet-level data, and reconstruct security incidents to establish criminal intent (Jouini & Bouzid, 2023). Federal University, Dutsin-Ma, has made strides in building its cybersecurity infrastructure, but there is a lack of a comprehensive network forensics strategy to investigate potential security breaches and cybercrimes. Without a proactive forensics system, identifying and prosecuting cybercriminals becomes a complex and delayed process, which could have significant ramifications on the university’s reputation and the security of its digital assets.
Statement of the Problem:
The Federal University, Dutsin-Ma, Katsina State, is facing challenges in effectively investigating cybercrimes due to the lack of a fully integrated network forensics strategy. The university’s existing network monitoring systems are primarily focused on preventing attacks, with limited capabilities for investigating security incidents after they have occurred. As a result, incidents of cybercrime, such as unauthorized access, data tampering, and intellectual property theft, go untracked and unpunished. The absence of a clear and comprehensive network forensics framework, coupled with insufficient training of cybersecurity personnel in forensics techniques, has made it difficult to effectively collect evidence and identify perpetrators.
Objectives of the Study:
To evaluate the current network forensics capabilities of Federal University, Dutsin-Ma.
To identify gaps in the university’s ability to collect, analyze, and preserve data for cybercrime investigations.
To propose solutions and improvements for enhancing the university's network forensics capabilities.
Research Questions:
What are the current capabilities of Federal University, Dutsin-Ma, in conducting network forensics investigations?
What are the key challenges faced by the university in collecting and analyzing network data for cybercrime investigations?
What enhancements can be made to the university's network forensics systems to improve cybercrime investigation processes?
Significance of the Study:
This study is significant because it aims to strengthen the university's ability to investigate and respond to cybercrime incidents effectively. By identifying gaps and proposing solutions for improving network forensics capabilities, the study will enable Federal University, Dutsin-Ma, to enhance its security posture and ensure that it can take swift action in the event of cybercrimes. The research will also provide valuable insights that can be used by other academic institutions to improve their network forensics capabilities.
Scope and Limitations of the Study:
This study will focus on the network forensics capabilities at Federal University, Dutsin-Ma, Katsina State. The scope is limited to evaluating the current systems in place for investigating cybercrimes and suggesting improvements for the university's cybersecurity infrastructure. Limitations include the study’s focus on network forensics alone, excluding other cybersecurity measures, and the availability of resources for implementing recommended solutions.
Definitions of Terms:
Network Forensics: The process of capturing, recording, and analyzing network traffic to identify and investigate potential cybercrimes.
Cybercrime: Criminal activities carried out via digital technologies, such as unauthorized access to computer systems and data breaches.
Packet-Level Data: The detailed information contained in the individual packets of data transmitted over a network, which can be analyzed during forensic investigations
Background of the Study
Childhood vaccination campaigns have been pivotal in reducing the incidence of in...
Background of the Study
Email marketing remains a fundamental component of digital communication strategies, particularl...
Background of the study
The introduction of virtual laboratories has transformed science education by allowing students to...
Background of the study
Learning disabilities (LDs) refer to a variety of challenges that students face in processing infor...
Background of the Study
Teacher training curricula are fundamental to the development of competent educat...
Background of the Study
Global economic integration has reshaped national economies by promoting free trade, capital mobili...
Background of the study
Digital codeswitching is a prevalent communicative strategy in Nigerian online co...
Background of the study
AI‑driven voice assistants—such as smart speakers and speech recognition kiosks—provide...
ABSTRACT
This projected is concerned with the impact of sales promotion strategies on customers patronage of Breweries I...
Background of the Study
Digital trends are continuously reshaping linguistic practices, extending beyond textual communica...