Background of the Study
Cyber threats are increasingly targeting academic institutions due to their vast digital resources and open-access networks. Federal University, Lafia, faces a growing number of cybersecurity threats, including phishing, ransomware, and data breaches. Cyber Threat Intelligence (CTI) provides organizations with actionable insights into emerging threats, helping them anticipate and mitigate risks (Nwachukwu et al., 2023).
Effective CTI strategies involve the collection, analysis, and dissemination of threat intelligence to improve cybersecurity defenses. Universities that leverage CTI can enhance their incident response capabilities, reduce attack surfaces, and strengthen network security policies (Adepoju & Daramola, 2024).
Statement of the Problem
Despite increasing cyber threats, Federal University, Lafia, lacks a structured approach to threat intelligence gathering and analysis. Security teams rely on reactive strategies rather than proactive threat prevention. Without effective CTI strategies, the university remains vulnerable to cyberattacks that could compromise student and staff data. This study evaluates the effectiveness of current CTI strategies and explores ways to enhance threat intelligence capabilities at the university.
Objectives of the Study
To assess the existing Cyber Threat Intelligence strategies at Federal University, Lafia.
To analyze the effectiveness of CTI in mitigating cyber threats.
To recommend improvements for enhancing CTI adoption at the university.
Research Questions
What CTI strategies are currently implemented at Federal University, Lafia?
How effective are these strategies in preventing and mitigating cyber threats?
What improvements can be made to enhance the university’s CTI framework?
Significance of the Study
This study will provide Federal University, Lafia, with insights into improving cybersecurity defenses using CTI. The research will benefit IT administrators and policymakers in formulating proactive security measures to counter evolving cyber threats.
Scope and Limitations of the Study
The study focuses on evaluating Cyber Threat Intelligence strategies in Federal University, Lafia, Nasarawa State. It does not cover physical security threats or general cybersecurity policies.
Definitions of Terms
Cyber Threat Intelligence (CTI): The process of collecting and analyzing threat data to enhance cybersecurity defenses.
Phishing: A cyberattack where attackers trick users into revealing sensitive information.
Incident Response: The process of detecting, responding to, and recovering from cybersecurity incidents.
Background of the Study
Corporate governance refers to the systems, processes, and practices through which companies are di...
ABSTRACT
This study assessed involvement of small and medium scale enterprises (SMEs) in cultured fish value chain in Niger State, Nigeri...
Abstract
This work investigate the influence of environment on the academic performance of primary school pupils. Three...
ABSTRACT
This study was on development and acceptability of natural, synthetic and mixed leatherworks for interior decoration in Kano Sta...
Background of the Study
Education grants are vital for improving the quality of education in Sokoto Sou...
Background of the study
Adult literacy programs have long been recognized as crucial vehicles for social change and communi...
Background of the Study
Board diversity refers to the inclusion of individuals from varied backgrounds, such as gender, ethnicity, profes...
BACKGROUND OF THE STUDY
The rapid advances in technological technology have brought about significant d...
Background of the Study
Cardiopulmonary resuscitation (CPR) is a life-saving technique used in emergency situations when...
Background of the Study
Budgetary participation refers to the involvement of employees in the formulati...