Background of the Study
As higher education institutions increasingly rely on digital infrastructure to manage academic records, student information, and research, they have become prime targets for cybercriminals. Cyber threats, such as data breaches, phishing, and ransomware attacks, are rampant in universities, leading to severe consequences ranging from financial loss to reputation damage (Okoro et al., 2023). To combat these threats, many universities are now adopting proactive cybersecurity strategies such as cyber threat hunting (Oluwaseun et al., 2024).
Cyber threat hunting refers to the process of actively searching for potential threats within a network, rather than waiting for automated security tools to detect them. This approach involves human expertise to analyze network traffic, search for anomalies, and identify signs of malicious activity that automated systems might miss. Federal University, Gashua, Yobe State, seeks to evaluate and improve its cybersecurity posture by comparing various cyber threat hunting techniques, thereby enhancing its defenses against cyberattacks.
This study will focus on evaluating and comparing different cyber threat hunting methods implemented in the university’s network to identify the most effective strategies in preventing and mitigating potential cyber threats. By examining the strengths and weaknesses of these techniques, the research aims to provide insights into improving the university’s cybersecurity framework.
Statement of the Problem
Federal University, Gashua, Yobe State, has experienced growing concerns about cyber threats targeting its network infrastructure. Despite relying on traditional security measures, the university’s cybersecurity team struggles with identifying and mitigating advanced persistent threats. This study addresses the need for an in-depth comparative analysis of cyber threat hunting techniques to determine the most effective methods for securing the university's digital assets.
Objectives of the Study
To evaluate and compare different cyber threat hunting techniques used at Federal University, Gashua.
To assess the effectiveness of each technique in detecting and mitigating cyber threats.
To recommend the most suitable threat hunting practices for improving the university’s cybersecurity defense.
Research Questions
What are the most commonly used cyber threat hunting techniques at Federal University, Gashua?
How effective are the different cyber threat hunting methods in detecting advanced cyber threats?
Which cyber threat hunting techniques would best strengthen the university’s overall cybersecurity strategy?
Significance of the Study
The findings of this study will contribute to the enhancement of cybersecurity practices at Federal University, Gashua, by identifying the most effective cyber threat hunting techniques. The research will provide insights into improving threat detection, preventing data breaches, and reducing the university’s vulnerability to cyberattacks.
Scope and Limitations of the Study
This study is limited to a comparative analysis of cyber threat hunting techniques at Federal University, Gashua, focusing on the university's network and infrastructure. The study does not extend to other cybersecurity measures such as firewalls or encryption technologies.
Definitions of Terms
Cyber Threat Hunting: The proactive process of searching for signs of malicious activity within a network.
Advanced Persistent Threat (APT): A prolonged and targeted cyberattack that seeks to gain unauthorized access to sensitive data.
Network Traffic Analysis: The process of inspecting and analyzing data transmitted across a network to detect unusual or malicious activity.
Background of the Study
Public debt has emerged as a critical factor in understanding the dynamics of modern financial mark...
Background of the Study
Epigenomic modifications play a critical role in regulating gene expression and are implicated in...
Background of the Study
Central bank policies, particularly those related to monetary control instruments...
Background of the Study
Zoning regulations play a crucial role in urban planning by dictating how land in a given area can...
Background of the Study
Human capital development refers to the process of enhancing the skills, knowledge, and abilities of employees to...
Background of the Study
Student engagement is a key indicator of academic success, and effective monitoring of engagement...
ABSTRACT
This study was carried out on the effect of covid-19 pandemic on sporting activities. To achie...
ABSTRACT
Problems and prospects of student hostile Accommodation problem in IMT, is the topic of this write-up. Th...
Background of the Study
Occupational exposure to chemotherapy drugs is a significant concern for healthcare professionals,...
ABSTRACT
Commercial land use is relatively a new investment opportunity that has enabled people to purchase plots of lan...