Background of the Study
Zero-day vulnerabilities are security flaws in software or hardware that are unknown to the vendor and are often exploited by cybercriminals before they are patched (Bello & Nwafor, 2024). These vulnerabilities are particularly dangerous as they allow attackers to breach systems undetected, causing significant damage to university networks that store sensitive academic and personal data. Federal University, Wukari, like many educational institutions, is highly susceptible to such exploits due to the complex and diverse IT infrastructure and the frequent use of third-party software.
Zero-day attacks are sophisticated, and their detection and prevention require advanced security systems capable of identifying unusual behaviors and anomalies in real-time. While traditional antivirus software focuses on known threats, zero-day exploit prevention involves behavioral analysis and anomaly detection through machine learning and heuristic techniques (Olowu et al., 2023).
This study aims to analyze zero-day vulnerability exploits in the network infrastructure of Federal University, Wukari, to understand their potential impact and propose effective mitigation strategies.
Statement of the Problem
Federal University, Wukari, faces increasing risks of zero-day vulnerability exploits due to the growing use of third-party software and inadequate patch management. The lack of real-time detection and defense mechanisms leaves the university’s network vulnerable to undetected attacks, compromising sensitive data and network integrity.
This study will investigate the nature of zero-day vulnerabilities, their exploitation methods, and propose defense mechanisms tailored to the university's network infrastructure.
Objectives of the Study
To identify common zero-day vulnerabilities in the network infrastructure of Federal University, Wukari.
To evaluate the effectiveness of current security measures in detecting and mitigating zero-day exploits.
To propose strategies for improving the detection and defense against zero-day vulnerabilities.
Research Questions
What are the most common zero-day vulnerabilities found in Federal University, Wukari’s network?
How effective are current security measures in identifying and mitigating zero-day exploits?
What strategies can be implemented to enhance the university's defense against zero-day vulnerabilities?
Significance of the Study
This study will contribute to enhancing the cybersecurity posture of Federal University, Wukari, by providing insights into zero-day vulnerabilities and offering practical solutions for their detection and prevention. The findings will benefit IT administrators, network engineers, and cybersecurity professionals in similar educational institutions.
Scope and Limitations of the Study
The study is limited to the analysis of zero-day vulnerabilities and their exploits within the network infrastructure of Federal University, Wukari, Taraba State. It does not address broader cybersecurity issues such as physical security or insider threats.
Definitions of Terms
Zero-Day Vulnerability: A security flaw in software or hardware that is exploited by attackers before the vendor is aware or has issued a fix.
Exploit: A method used by attackers to take advantage of a security vulnerability.
Anomaly Detection: A method of identifying unusual behavior or patterns within a network that may indicate a security threat.
Background of the Study
Political activism among university students has been a critical aspect of poli...
Background of the Study
Internal controls are integral to ensuring the integrity of financial reporting in organizations...
Background of the Study
Audit quality is a cornerstone of financial transparency and corporate accounta...
Chapter One: Introduction
Background of the Study
Cost accounting techniques are fundamental to the financial and operational s...
Abstract
Jatropha curcas seed oil is a known energy source in biodiesel which but for its toxicity, also has potential of being used as f...
Background to the Study
The Church from inception has rendered various levels of social welfare services to humanity as...
Project Body
Background of the study:
Effective traffic surveillance is critical for managing urban congestion, ensuring road safety, an...
ABSTRACT
Microcontroller based automate controller is a project design of a system that is used in operating a gate automatically. The sy...
Background of the Study
Pediatric cardiac arrest, though rare, is a life-threatening emergency that requires prompt and effective interve...