Background of the Study
Network security is a critical concern for academic institutions, as they are frequently targeted by cybercriminals seeking to exploit vulnerabilities in their IT infrastructure. Network-based attacks, such as Distributed Denial of Service (DDoS), Man-in-the-Middle (MITM), and phishing attacks, pose significant threats to the confidentiality, integrity, and availability of data at Federal University, Wukari. The growing adoption of online learning platforms, cloud services, and remote access technologies further increases the risk of cyber threats. Without proper mitigation strategies, the university’s network remains susceptible to attacks that could compromise sensitive academic and administrative information. This study seeks to investigate prevalent network-based attacks targeting the university’s IT infrastructure and propose effective mitigation techniques.
Statement of the Problem
Federal University, Wukari, has faced challenges in maintaining a secure network infrastructure due to the increasing sophistication of cyber threats. The lack of real-time monitoring, weak access controls, and outdated security policies contribute to the university’s vulnerability to network-based attacks. These attacks can lead to unauthorized data access, disruption of academic activities, and financial losses. The absence of a comprehensive mitigation framework further exacerbates the risks. This study aims to identify the most common network-based attacks targeting the university and develop a set of effective mitigation strategies to enhance the security of its IT infrastructure.
Objectives of the Study
To identify and analyze prevalent network-based attacks targeting Federal University, Wukari.
To assess the effectiveness of the university’s existing network security measures.
To propose mitigation strategies for enhancing the security of the university’s network infrastructure.
Research Questions
What are the most common network-based attacks affecting Federal University, Wukari?
How effective are the current network security measures in mitigating these attacks?
What mitigation strategies can be implemented to improve network security at the university?
Scope and Limitations of the Study
The study is limited to investigating network-based attacks and mitigation strategies at Federal University, Wukari, Taraba State. It will focus on analyzing the university’s IT infrastructure and existing security policies. The study will not cover cyber threats outside the university network or global cybersecurity trends. Possible limitations include restricted access to classified security logs and real-time attack data.
Definitions of Terms
Network-Based Attack: A cyber attack that targets a network infrastructure to gain unauthorized access, disrupt services, or steal data.
DDoS Attack: A type of attack in which multiple compromised devices are used to flood a network with traffic, causing disruption.
Mitigation Strategy: A security measure designed to reduce the impact or likelihood of a cyber threat.
Background of the Study
Consumer behavior is a critical driver of product innovation, as firms increasingly tailor their of...
Background of the Study
Traditional rulers have historically occupied influential positions within Nigerian communities, s...
Project Body
Chapter One: Introduction
1.1 Background of the Study
Political clientelism and patronage have long been defining features of N...
ABSTRACT
Biological diversity-the variety within and among species and ecosystem is essential for our planet, human wellbeing, livelihood...
Background of the Study
Non-governmental organizations (NGOs) play a critical role in addressing the root causes of conflic...
Background of the Study:
The nexus between economic policy and technological innovation is increasingly recognized as a driving force beh...
ABSTRACT: This study explored the role of early childhood education in fo...
Background of the Study
Chemotherapy is a cornerstone of cancer treatment, offering the potential to treat and manage various forms of ca...
Background of the study
In many universities, particularly large ones like the Federal University of Technology, Minna, the...