0704-883-0675     |      dataprojectng@gmail.com

An Investigation into the Use of Network Honeypots for Cybersecurity Research in Federal University, Wukari, Taraba State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study

Network honeypots are decoy systems or networks set up to attract cybercriminals and hackers, providing an environment for studying their behavior and techniques. These systems are invaluable for cybersecurity research, as they allow institutions to analyze attack methods without putting their real systems at risk (Ahmed et al., 2023). Federal University, Wukari, Taraba State, recognizes the need for innovative approaches to enhance its cybersecurity defenses. Honeypots have gained popularity as an effective tool for improving threat intelligence, offering insight into new vulnerabilities, attack vectors, and hacker tactics (Chukwudi & Iman, 2024).

This research investigates the deployment and utilization of network honeypots at Federal University, Wukari, for the purpose of cybersecurity research. By collecting data on attempted attacks and analyzing hacker behavior, the university can improve its defense strategies, update security protocols, and develop a stronger understanding of potential threats.

Statement of the Problem

The increasing frequency of cyberattacks on higher education institutions calls for advanced cybersecurity research tools to enhance threat detection and response capabilities. Federal University, Wukari, currently lacks a dedicated research tool like honeypots that could help in the analysis of attack strategies. This research intends to assess the effectiveness of network honeypots in collecting valuable data to improve the university’s security measures.

Objectives of the Study

  1. To investigate the use of network honeypots for cybersecurity research at Federal University, Wukari.

  2. To analyze the data collected from honeypots to identify emerging cyber threats and attack patterns.

  3. To develop recommendations on how Federal University can incorporate honeypots into its cybersecurity strategy to enhance threat detection and response.

Research Questions

  1. How can network honeypots be effectively implemented at Federal University, Wukari for cybersecurity research?

  2. What types of cyber threats and attack methods can be identified through the use of honeypots?

  3. How can the insights gained from honeypots improve Federal University’s cybersecurity posture and incident response strategies?

Significance of the Study

This study will help Federal University, Wukari, adopt a proactive cybersecurity research strategy using honeypots. The insights gained from honeypot data will enable the university to strengthen its defenses and stay ahead of emerging threats.

Scope and Limitations of the Study

The study is limited to the implementation and analysis of network honeypots at Federal University, Wukari. It focuses solely on honeypots and does not extend to other cybersecurity research tools or methods.

Definitions of Terms

  • Network Honeypot: A system or resource intentionally exposed to attract and capture information about cyberattacks.

  • Cybersecurity Research: The process of studying threats, vulnerabilities, and defense mechanisms to improve network security.

  • Threat Intelligence: Information about potential or current cyberattacks that helps organizations understand their adversaries and strengthen defenses.





Related Project Materials

CONSUMER PREFERENCE FOR MALTA – GUINNESS, MALTINA AND VITA – MALT BRANDS OF MALT DRINKS

BACKGROUND OF THE STUDY

The introduction of Structural Adjustment Programme (SAP) in Nigeria has result...

Read more
An Investigation of Nurses' Awareness and Prevention of Nosocomial Infections in Pediatric Wards at Bayelsa State General Hospital

Background of the Study
Nosocomial infections, also known as healthcare-associated infections (HAIs), are a major concern i...

Read more
An Appraisal of the Effects of GDP and Inflation on Fiscal Policy Adjustments in Nigeria

Background of the Study:
Fiscal policy in Nigeria is shaped by various macroeconomic factors, notably GDP growth and inflat...

Read more
THE INFLUENCE OF PROJECT SCOPE MANAGEMENT ON PROJECT OUTCOMES

Abstract: This research examines the influence of project scope management on project outcomes, with objecti...

Read more
ASSESSING THE BENEFITS OF EARLY CHILDHOOD EDUCATION IN ADDRESSING CYBERBULLYING

 ABSTRACT: Assessing the benefits of early childhood education in add...

Read more
Assessment of Public Perception of Community Newspaper Objectivity in Dambatta Local Government, Kano State

Chapter One: Introduction

1.1 Background of the Study

Community newspapers are vital in fostering local communication, addressi...

Read more
A Comparative Study of Digital Marketing Strategies vs. Traditional Marketing: A Study of Retail Businesses in Kwara State

Background of the Study

The evolution of marketing strategies has been significantly influenced by advancements in technology. Traditiona...

Read more
An examination of social impact marketing on digital engagement: A case study of a non-profit organization in Lagos, Nigeria.

Background of the study:

Social impact marketing has emerged as a critical strategy for non-profit organizations aiming...

Read more
The impact of agricultural expansion on forest reserves in Ife East Local Government Area, Osun State

Background of the study
Agricultural expansion is increasingly encroaching upon forest reserves, leading t...

Read more
A Comparative Study of Security Vulnerabilities in Mobile vs. Web Applications: A Case Study of Fintech Firms in Taraba State

Background of the Study

Mobile and web applications are essential for fintech firms, providing customers with easy acces...

Read more
Share this page with your friends




whatsapp