Background of the Study
Network honeypots are decoy systems or networks set up to attract cybercriminals and hackers, providing an environment for studying their behavior and techniques. These systems are invaluable for cybersecurity research, as they allow institutions to analyze attack methods without putting their real systems at risk (Ahmed et al., 2023). Federal University, Wukari, Taraba State, recognizes the need for innovative approaches to enhance its cybersecurity defenses. Honeypots have gained popularity as an effective tool for improving threat intelligence, offering insight into new vulnerabilities, attack vectors, and hacker tactics (Chukwudi & Iman, 2024).
This research investigates the deployment and utilization of network honeypots at Federal University, Wukari, for the purpose of cybersecurity research. By collecting data on attempted attacks and analyzing hacker behavior, the university can improve its defense strategies, update security protocols, and develop a stronger understanding of potential threats.
Statement of the Problem
The increasing frequency of cyberattacks on higher education institutions calls for advanced cybersecurity research tools to enhance threat detection and response capabilities. Federal University, Wukari, currently lacks a dedicated research tool like honeypots that could help in the analysis of attack strategies. This research intends to assess the effectiveness of network honeypots in collecting valuable data to improve the university’s security measures.
Objectives of the Study
To investigate the use of network honeypots for cybersecurity research at Federal University, Wukari.
To analyze the data collected from honeypots to identify emerging cyber threats and attack patterns.
To develop recommendations on how Federal University can incorporate honeypots into its cybersecurity strategy to enhance threat detection and response.
Research Questions
How can network honeypots be effectively implemented at Federal University, Wukari for cybersecurity research?
What types of cyber threats and attack methods can be identified through the use of honeypots?
How can the insights gained from honeypots improve Federal University’s cybersecurity posture and incident response strategies?
Significance of the Study
This study will help Federal University, Wukari, adopt a proactive cybersecurity research strategy using honeypots. The insights gained from honeypot data will enable the university to strengthen its defenses and stay ahead of emerging threats.
Scope and Limitations of the Study
The study is limited to the implementation and analysis of network honeypots at Federal University, Wukari. It focuses solely on honeypots and does not extend to other cybersecurity research tools or methods.
Definitions of Terms
Network Honeypot: A system or resource intentionally exposed to attract and capture information about cyberattacks.
Cybersecurity Research: The process of studying threats, vulnerabilities, and defense mechanisms to improve network security.
Threat Intelligence: Information about potential or current cyberattacks that helps organizations understand their adversaries and strengthen defenses.
BACKGROUND OF THE STUDY
The introduction of Structural Adjustment Programme (SAP) in Nigeria has result...
Background of the Study
Nosocomial infections, also known as healthcare-associated infections (HAIs), are a major concern i...
Background of the Study:
Fiscal policy in Nigeria is shaped by various macroeconomic factors, notably GDP growth and inflat...
Abstract: This research examines the influence of project scope management on project outcomes, with objecti...
ABSTRACT: Assessing the benefits of early childhood education in add...
Chapter One: Introduction
1.1 Background of the Study
Community newspapers are vital in fostering local communication, addressi...
Background of the Study
The evolution of marketing strategies has been significantly influenced by advancements in technology. Traditiona...
Background of the study:
Social impact marketing has emerged as a critical strategy for non-profit organizations aiming...
Background of the study
Agricultural expansion is increasingly encroaching upon forest reserves, leading t...
Background of the Study
Mobile and web applications are essential for fintech firms, providing customers with easy acces...