Background of the Study
Zero-day vulnerabilities are security flaws in software or hardware that are unknown to the vendor and are often exploited by cybercriminals before they are patched (Bello & Nwafor, 2024). These vulnerabilities are particularly dangerous as they allow attackers to breach systems undetected, causing significant damage to university networks that store sensitive academic and personal data. Federal University, Wukari, like many educational institutions, is highly susceptible to such exploits due to the complex and diverse IT infrastructure and the frequent use of third-party software.
Zero-day attacks are sophisticated, and their detection and prevention require advanced security systems capable of identifying unusual behaviors and anomalies in real-time. While traditional antivirus software focuses on known threats, zero-day exploit prevention involves behavioral analysis and anomaly detection through machine learning and heuristic techniques (Olowu et al., 2023).
This study aims to analyze zero-day vulnerability exploits in the network infrastructure of Federal University, Wukari, to understand their potential impact and propose effective mitigation strategies.
Statement of the Problem
Federal University, Wukari, faces increasing risks of zero-day vulnerability exploits due to the growing use of third-party software and inadequate patch management. The lack of real-time detection and defense mechanisms leaves the university’s network vulnerable to undetected attacks, compromising sensitive data and network integrity.
This study will investigate the nature of zero-day vulnerabilities, their exploitation methods, and propose defense mechanisms tailored to the university's network infrastructure.
Objectives of the Study
To identify common zero-day vulnerabilities in the network infrastructure of Federal University, Wukari.
To evaluate the effectiveness of current security measures in detecting and mitigating zero-day exploits.
To propose strategies for improving the detection and defense against zero-day vulnerabilities.
Research Questions
What are the most common zero-day vulnerabilities found in Federal University, Wukari’s network?
How effective are current security measures in identifying and mitigating zero-day exploits?
What strategies can be implemented to enhance the university's defense against zero-day vulnerabilities?
Significance of the Study
This study will contribute to enhancing the cybersecurity posture of Federal University, Wukari, by providing insights into zero-day vulnerabilities and offering practical solutions for their detection and prevention. The findings will benefit IT administrators, network engineers, and cybersecurity professionals in similar educational institutions.
Scope and Limitations of the Study
The study is limited to the analysis of zero-day vulnerabilities and their exploits within the network infrastructure of Federal University, Wukari, Taraba State. It does not address broader cybersecurity issues such as physical security or insider threats.
Definitions of Terms
Zero-Day Vulnerability: A security flaw in software or hardware that is exploited by attackers before the vendor is aware or has issued a fix.
Exploit: A method used by attackers to take advantage of a security vulnerability.
Anomaly Detection: A method of identifying unusual behavior or patterns within a network that may indicate a security threat.
Background of the Study
Renewable energy investments, particularly in solar energy, have become increasingly significant in many industri...
Background Of The Study
In modern-day Nigeria, it is almost impossible to have a discussion that does n...
Background of the Study
Digital channel convergence refers to the integration of various digital platforms...
Background of the Study:
Diplomatic negotiations have historically served as crucial mechanisms in resolving territorial disputes, partic...
BACKGROUND TO THE STUDY
Kenya's population is rapidly increasing, yet more than half of the country...
Background of the study
Domestic and sexual violence are shown in the media in such a way that the publ...
Abstract: This study examines the influence of leadership styles on project team performance, aiming to: 1)...
Abstract
Food additives is a food preservation solution which involves exposes foodstuffs to a source of energy capable...
Background of the Study:
Interactive brand activations have become a pivotal element in shaping consumer connections, es...
Background of the Study: Strategic communication is an essential aspect of crisis management, particularly for media firms that operate in environm...