0704-883-0675     |      dataprojectng@gmail.com

Analysis of Zero-Day Vulnerability Exploits in University Networks: A Case Study of Federal University, Wukari, Taraba State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study

Zero-day vulnerabilities are security flaws in software or hardware that are unknown to the vendor and are often exploited by cybercriminals before they are patched (Bello & Nwafor, 2024). These vulnerabilities are particularly dangerous as they allow attackers to breach systems undetected, causing significant damage to university networks that store sensitive academic and personal data. Federal University, Wukari, like many educational institutions, is highly susceptible to such exploits due to the complex and diverse IT infrastructure and the frequent use of third-party software.

Zero-day attacks are sophisticated, and their detection and prevention require advanced security systems capable of identifying unusual behaviors and anomalies in real-time. While traditional antivirus software focuses on known threats, zero-day exploit prevention involves behavioral analysis and anomaly detection through machine learning and heuristic techniques (Olowu et al., 2023).

This study aims to analyze zero-day vulnerability exploits in the network infrastructure of Federal University, Wukari, to understand their potential impact and propose effective mitigation strategies.

Statement of the Problem

Federal University, Wukari, faces increasing risks of zero-day vulnerability exploits due to the growing use of third-party software and inadequate patch management. The lack of real-time detection and defense mechanisms leaves the university’s network vulnerable to undetected attacks, compromising sensitive data and network integrity.

This study will investigate the nature of zero-day vulnerabilities, their exploitation methods, and propose defense mechanisms tailored to the university's network infrastructure.

Objectives of the Study

  1. To identify common zero-day vulnerabilities in the network infrastructure of Federal University, Wukari.

  2. To evaluate the effectiveness of current security measures in detecting and mitigating zero-day exploits.

  3. To propose strategies for improving the detection and defense against zero-day vulnerabilities.

Research Questions

  1. What are the most common zero-day vulnerabilities found in Federal University, Wukari’s network?

  2. How effective are current security measures in identifying and mitigating zero-day exploits?

  3. What strategies can be implemented to enhance the university's defense against zero-day vulnerabilities?

Significance of the Study

This study will contribute to enhancing the cybersecurity posture of Federal University, Wukari, by providing insights into zero-day vulnerabilities and offering practical solutions for their detection and prevention. The findings will benefit IT administrators, network engineers, and cybersecurity professionals in similar educational institutions.

Scope and Limitations of the Study

The study is limited to the analysis of zero-day vulnerabilities and their exploits within the network infrastructure of Federal University, Wukari, Taraba State. It does not address broader cybersecurity issues such as physical security or insider threats.

Definitions of Terms

  • Zero-Day Vulnerability: A security flaw in software or hardware that is exploited by attackers before the vendor is aware or has issued a fix.

  • Exploit: A method used by attackers to take advantage of a security vulnerability.

  • Anomaly Detection: A method of identifying unusual behavior or patterns within a network that may indicate a security threat.





Related Project Materials

An Investigation of the Role of Female University Students in Political Activism in Jos North Local Government Area, Plateau State

Background of the Study

Political activism among university students has been a critical aspect of poli...

Read more
The Impact of Internal Controls on Financial Reporting Fraud in Nigerian Universities: A Case Study of UNILAG

Background of the Study

Internal controls are integral to ensuring the integrity of financial reporting in organizations...

Read more
The Effect of Audit Firm Reputation on Audit Quality in Nigeria: A Study of KPMG Clients

Background of the Study

Audit quality is a cornerstone of financial transparency and corporate accounta...

Read more
Impact of Cost Accounting Techniques on Pricing Decisions in Fagge Local Government Area

Chapter One: Introduction

Background of the Study

Cost accounting techniques are fundamental to the financial and operational s...

Read more
EFFECTS OF DETOXIFICATION ON SOME PHARMACOLOGICAL PROPERTIES OF JATROPHA CURCAS LINN. (EUPHORBIACEAE) SEED OIL IN LABORATORY ANIMALS

Abstract

Jatropha curcas seed oil is a known energy source in biodiesel which but for its toxicity, also has potential of being used as f...

Read more
HISTORICAL DISCOURSE ON SOCIAL WELFARE SERVICES OF THE CATHOLIC CHURCH IN OWERRI ECCLESIASTICAL PROVINCE, NIGERIA, 1968-2016

Background to the Study

The Church from inception has rendered various levels of social welfare services to humanity as...

Read more
Language, Morphology, syntax, bilingualism, pragmatic, lexical, rhetorical, communication

Project Body

Read more
Implementation of IoT-Based Smart Automated Traffic Surveillance Systems in Bauchi LGA, Bauchi State

Background of the study:
Effective traffic surveillance is critical for managing urban congestion, ensuring road safety, an...

Read more
CONSTRUCTION OF A MICROCONTROLLER BASED

ABSTRACT

Microcontroller based automate controller is a project design of a system that is used in operating a gate automatically. The sy...

Read more
An Investigation of Nurses' Preparedness for Handling Pediatric Cardiac Arrests at Federal Medical Centre, Owerri

Background of the Study

Pediatric cardiac arrest, though rare, is a life-threatening emergency that requires prompt and effective interve...

Read more
Share this page with your friends




whatsapp