Background of the Study
As higher education institutions increasingly rely on digital infrastructure to manage academic records, student information, and research, they have become prime targets for cybercriminals. Cyber threats, such as data breaches, phishing, and ransomware attacks, are rampant in universities, leading to severe consequences ranging from financial loss to reputation damage (Okoro et al., 2023). To combat these threats, many universities are now adopting proactive cybersecurity strategies such as cyber threat hunting (Oluwaseun et al., 2024).
Cyber threat hunting refers to the process of actively searching for potential threats within a network, rather than waiting for automated security tools to detect them. This approach involves human expertise to analyze network traffic, search for anomalies, and identify signs of malicious activity that automated systems might miss. Federal University, Gashua, Yobe State, seeks to evaluate and improve its cybersecurity posture by comparing various cyber threat hunting techniques, thereby enhancing its defenses against cyberattacks.
This study will focus on evaluating and comparing different cyber threat hunting methods implemented in the university’s network to identify the most effective strategies in preventing and mitigating potential cyber threats. By examining the strengths and weaknesses of these techniques, the research aims to provide insights into improving the university’s cybersecurity framework.
Statement of the Problem
Federal University, Gashua, Yobe State, has experienced growing concerns about cyber threats targeting its network infrastructure. Despite relying on traditional security measures, the university’s cybersecurity team struggles with identifying and mitigating advanced persistent threats. This study addresses the need for an in-depth comparative analysis of cyber threat hunting techniques to determine the most effective methods for securing the university's digital assets.
Objectives of the Study
To evaluate and compare different cyber threat hunting techniques used at Federal University, Gashua.
To assess the effectiveness of each technique in detecting and mitigating cyber threats.
To recommend the most suitable threat hunting practices for improving the university’s cybersecurity defense.
Research Questions
What are the most commonly used cyber threat hunting techniques at Federal University, Gashua?
How effective are the different cyber threat hunting methods in detecting advanced cyber threats?
Which cyber threat hunting techniques would best strengthen the university’s overall cybersecurity strategy?
Significance of the Study
The findings of this study will contribute to the enhancement of cybersecurity practices at Federal University, Gashua, by identifying the most effective cyber threat hunting techniques. The research will provide insights into improving threat detection, preventing data breaches, and reducing the university’s vulnerability to cyberattacks.
Scope and Limitations of the Study
This study is limited to a comparative analysis of cyber threat hunting techniques at Federal University, Gashua, focusing on the university's network and infrastructure. The study does not extend to other cybersecurity measures such as firewalls or encryption technologies.
Definitions of Terms
Cyber Threat Hunting: The proactive process of searching for signs of malicious activity within a network.
Advanced Persistent Threat (APT): A prolonged and targeted cyberattack that seeks to gain unauthorized access to sensitive data.
Network Traffic Analysis: The process of inspecting and analyzing data transmitted across a network to detect unusual or malicious activity.
Chapter One: Introduction
1.1 Background of the Study
Community radio plays a crucial role in promoting civic participation by...
ABSTRACT
This study sought the psychology impact of living with sickle cell anaemia, a study of Babcock...
Background of the Study
Migration is a significant socio-economic phenomenon that reshapes family dynamics and traditional structures. In...
Background of the Study
Mobile technology has revolutionized the way corporate banking services are delivered, offering unp...
Background of the Study
Educational reforms in Nigeria have increasingly focused on updating university curricula to meet...
Background of the Study
Point-of-sale (POS) terminals are central to retail banking operations, facilitating swift and accu...
POVERTY REDUCTION
Abstract
This study examines the factors that associated with the decision...
ABSTRACT
Customer loyalty has been a major issue in marketing. This concept is of great importance in the Global Systems of Mobile (GSM)...
ABSTRACT
The 21st Century has been characterised with an unprecedented rate of urbanisation. Presently, about 50% of global population ar...
Background of the Study
Social media has emerged as a dynamic arena for language evolution, particularly...