0704-883-0675     |      dataprojectng@gmail.com

Analysis of Zero-Day Vulnerability Exploits in University Networks: A Case Study of Federal University, Wukari, Taraba State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study

Zero-day vulnerabilities are security flaws in software or hardware that are unknown to the vendor and are often exploited by cybercriminals before they are patched (Bello & Nwafor, 2024). These vulnerabilities are particularly dangerous as they allow attackers to breach systems undetected, causing significant damage to university networks that store sensitive academic and personal data. Federal University, Wukari, like many educational institutions, is highly susceptible to such exploits due to the complex and diverse IT infrastructure and the frequent use of third-party software.

Zero-day attacks are sophisticated, and their detection and prevention require advanced security systems capable of identifying unusual behaviors and anomalies in real-time. While traditional antivirus software focuses on known threats, zero-day exploit prevention involves behavioral analysis and anomaly detection through machine learning and heuristic techniques (Olowu et al., 2023).

This study aims to analyze zero-day vulnerability exploits in the network infrastructure of Federal University, Wukari, to understand their potential impact and propose effective mitigation strategies.

Statement of the Problem

Federal University, Wukari, faces increasing risks of zero-day vulnerability exploits due to the growing use of third-party software and inadequate patch management. The lack of real-time detection and defense mechanisms leaves the university’s network vulnerable to undetected attacks, compromising sensitive data and network integrity.

This study will investigate the nature of zero-day vulnerabilities, their exploitation methods, and propose defense mechanisms tailored to the university's network infrastructure.

Objectives of the Study

  1. To identify common zero-day vulnerabilities in the network infrastructure of Federal University, Wukari.

  2. To evaluate the effectiveness of current security measures in detecting and mitigating zero-day exploits.

  3. To propose strategies for improving the detection and defense against zero-day vulnerabilities.

Research Questions

  1. What are the most common zero-day vulnerabilities found in Federal University, Wukari’s network?

  2. How effective are current security measures in identifying and mitigating zero-day exploits?

  3. What strategies can be implemented to enhance the university's defense against zero-day vulnerabilities?

Significance of the Study

This study will contribute to enhancing the cybersecurity posture of Federal University, Wukari, by providing insights into zero-day vulnerabilities and offering practical solutions for their detection and prevention. The findings will benefit IT administrators, network engineers, and cybersecurity professionals in similar educational institutions.

Scope and Limitations of the Study

The study is limited to the analysis of zero-day vulnerabilities and their exploits within the network infrastructure of Federal University, Wukari, Taraba State. It does not address broader cybersecurity issues such as physical security or insider threats.

Definitions of Terms

  • Zero-Day Vulnerability: A security flaw in software or hardware that is exploited by attackers before the vendor is aware or has issued a fix.

  • Exploit: A method used by attackers to take advantage of a security vulnerability.

  • Anomaly Detection: A method of identifying unusual behavior or patterns within a network that may indicate a security threat.





Related Project Materials

The Impact of Renewable Energy Investments on Business Performance: A Study of Solar Companies in Abuja

Background of the Study

Renewable energy investments, particularly in solar energy, have become increasingly significant in many industri...

Read more
LEADERSHIP STYLES AND WORKERS PERFORMANCE IN AN ORGANISATION (A CASE STUDY OF UNILEVER PLC, LAGOS)

Background Of The Study

In modern-day Nigeria, it is almost impossible to have a discussion that does n...

Read more
An investigation of digital channel convergence on streamlining service delivery in banking: a case study of Co-operative Bank of Nigeria

Background of the Study
Digital channel convergence refers to the integration of various digital platforms...

Read more
The impact of diplomatic negotiations on resolving territorial disputes: An evaluation of the India–Pakistan conflict

Background of the Study:

Diplomatic negotiations have historically served as crucial mechanisms in resolving territorial disputes, partic...

Read more
A CRITICAL ANALYSIS OF HEALTH CARE SYSTEM ACCESSIBILITY

BACKGROUND TO THE STUDY

Kenya's population is rapidly increasing, yet more than half of the country...

Read more
AN ASSESSMENT OF NEWSPAPERS IN REPORTING DOMESTIC VIOLENCE IN IMO STATE

Background of the study

Domestic and sexual violence are shown in the media in such a way that the publ...

Read more
THE INFLUENCE OF LEADERSHIP STYLES ON PROJECT TEAM PERFORMANCE

Abstract: This study examines the influence of leadership styles on project team performance, aiming to: 1)...

Read more
ADDITIVES AND PRESERVATIVES USED IN FOOD PROCESSING AND PRESERVATION, AND THEIR HEALTH IMPLICATION

Abstract

Food additives is a food preservation solution which involves exposes foodstuffs to a source of energy capable...

Read more
The effect of interactive brand activations on consumer connection: A study of a product launch event in Kaduna

Background of the Study:

Interactive brand activations have become a pivotal element in shaping consumer connections, es...

Read more
An examination of the role of strategic communication in crisis management: A case study of media firms in Jigawa State.

Background of the Study: Strategic communication is an essential aspect of crisis management, particularly for media firms that operate in environm...

Read more
Share this page with your friends




whatsapp