Background of the Study
Universities are prime targets for cybercriminals due to their vast amounts of sensitive data, including research, student records, and financial information. Federal University Gashua, Yobe State, is no exception to this growing concern. To address these challenges, universities need robust systems to detect, analyze, and respond to cyber threats. Cyber Threat Intelligence (CTI) platforms provide critical insights into emerging cyber threats, enabling institutions to proactively defend their networks and information systems.
Cyber threat intelligence involves the collection and analysis of information about potential or existing cyber threats to enhance an organization’s ability to prevent and respond to attacks. For universities, a CTI platform can automate the detection of threats, provide real-time alerts, and integrate with existing security infrastructure to improve incident response times. However, the adoption and implementation of effective CTI platforms in Nigerian universities are still limited. This study aims to develop a CTI platform for Federal University Gashua that can help the institution effectively mitigate cyber risks and enhance its cybersecurity posture.
Statement of the Problem
Federal University Gashua is currently at risk of cyberattacks but lacks a centralized platform to collect, analyze, and disseminate actionable cyber threat intelligence. The absence of such a system hinders the university’s ability to detect and respond to emerging threats in real-time, potentially putting its digital infrastructure and sensitive data at risk. This study seeks to develop a CTI platform specifically designed for the needs and challenges of universities in Nigeria.
Objectives of the Study
To design and develop a Cyber Threat Intelligence platform tailored to the needs of universities in Nigeria.
To integrate real-time threat monitoring and reporting features into the platform.
To evaluate the effectiveness of the CTI platform in enhancing Federal University Gashua’s cybersecurity defenses.
Research Questions
How can a Cyber Threat Intelligence platform improve the detection and management of cyber threats at Federal University Gashua?
What key features should be included in a CTI platform to enhance its usefulness for universities?
How effective is the CTI platform in improving incident response times and reducing cybersecurity risks at Federal University Gashua?
Significance of the Study
This study will contribute to enhancing the cybersecurity infrastructure at Federal University Gashua by providing a system that can proactively detect, analyze, and respond to cyber threats. Additionally, the findings will offer insights for other Nigerian universities looking to improve their cyber threat intelligence capabilities.
Scope and Limitations of the Study
The research will focus on the development and evaluation of a CTI platform for Federal University Gashua. Limitations include the challenge of integrating the platform with existing security infrastructure and the potential need for specialized staff to operate the system effectively.
Definitions of Terms
Cyber Threat Intelligence (CTI): The process of collecting, analyzing, and sharing information about potential or existing cyber threats to improve defense mechanisms.
Threat Monitoring: The continuous observation of network traffic and user behavior to detect signs of potential cybersecurity threats.
Incident Response: The process of identifying, managing, and mitigating the impact of a cybersecurity breach or attack.
Cybersecurity Defenses: Measures and technologies designed to protect an organization’s systems, networks, and data from cyberattacks.
Background of the Study
Communal conflicts are a recurring issue in Gassol Local Government Area, Taraba State, driven b...
CHAPTER ONE
INTRODUCTION
Background of the study
Electronic l...
Background of the Study
Cooperative societies are crucial for empowering individuals through pooled res...
Background of the Study
Kano Municipal Local Government Area, one of the most populous urban areas in northern Nigeria, faces significant...
Background of the Study
The increasing availability and adoption of open-access resources have transformed the landscape of...
Background of the study
Product differentiation is a strategy that involves creating distinct product attributes to distin...
Background of the Study
Corporate Social Responsibility (CSR) has become an essential component of modern business strategi...
Background of the study
Entrepreneurship education has emerged as an essential component in preparing stu...
THE IMPACT OF CYBERSECURITY ON INFORMATION SYSTEMS
Abstract: This study aimed to assess the impac...