Institutional Strategies for Cybersecurity in Higher Education Institutions
Abstract
:1. Introduction
2. An Overview of Cyberattacks in the Past Decades
3. Potential Cybersecurity Risks in the New Decade
4. Managing Cybersecurity in HEIs: A Call for Change
5. Strategies for Addressing the Challenges of Cybersecurity in HEIs: A System-Wide Approach
5.1. Strengthening Institutional Governance for Cybersecurity
5.2. Revisiting Cybersecurity KPIs
5.3. Explicating Cybersecurity Policies, Guidelines and Mechanisms
5.4. Training and Cybersecurity Awareness Campaigns to Build Cybersecurity Culture
5.5. Responding to AI-Based Cyber-Threats and Harnessing AI to Enhance Cybersecurity
5.6. Introduction of New and More Sophisticated Security Measures
5.7. Paying Attention to Mobile Devices Use, Using Encryption as a Daily Practice
5.8. Risk Management
6. Conclusions and Way Forward
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bongiovanni, I. The least secure places in the universe? A systematic literature review on information security management in higher education. Comput. Secur. 2019, 86, 350–357. [Google Scholar] [CrossRef]
- Kwaa-Aidoo, E.K.; Agbeko, M. An analysis of information system security of a Ghanaian university. Int. J. Inf. Secur. Sci. 2018, 7, 90–99. [Google Scholar]
- Pinheiro, J. Review of cyber threats on Educational Institutions. In Proceedings of the Digital Privacy and Security Conference, Washington, DC, USA, 15 January 2020; Cordeiro, C., Barbosa, H., Eds.; Universidade Lusófona do Porto: Porto, Portugal, 2020; pp. 43–51. [Google Scholar]
- Adams, A.; Blanford, A. Security and online learning: To protect and prohibit. In Usability Evaluation of Online Learning Programs; IGI Global: Hershey, PA, USA, 2003; pp. 331–359. [Google Scholar]
- Alexei, A.; Alexei, A. Cyber Security Threat Analysis in Higher Education Institutions As A Result Of Distance Learning. Int. J. Sci. Technol. Res. 2021, 10, 128–133. [Google Scholar]
- Kelly, B.; McCormack, M.; Reeves, J.; Brooks, D.C.; O’Brien, J. 2021 EDUCAUSE Horizon Report: Information Security Edition; EDUCAUSE: Boulder, CO, USA, 2021. [Google Scholar]
- Czarniawska, B. Social Science Research: From Field to Desk; Sage: London, UK, 2014. [Google Scholar]
- Murphey, D. A History of Information Security. IFSEC Global. 2019. Available online: https://www.ifsecglobal.com/cyber-security/a-history-of-information-security/ (accessed on 20 February 2022).
- Lee, I. Cybersecurity: Risk management framework and investment cost analysis. Bus. Horiz. 2021, 64, 659–671. [Google Scholar] [CrossRef]
- Easttom, C. Computer Security Fundamentals, 4th ed.; Pearson IT Certification: Indianapolis, IN, USA, 2019. [Google Scholar]
- Ferbrache, D. A Pathology of Computer Viruses; Springer Science & Business Media: Berlin, Germany, 2012. [Google Scholar]
- Grispos, G. Criminals: Cybercriminals. Encycl. Secur. Emerg. Manag. 2019, 1, 1–7. [Google Scholar]
- Furstenau, L.B.; Sott, M.K.; Homrich, A.J.O.; Kipper, L.M.; Al Abri, A.A.; Cardoso, T.F.; Cobo, M.J. 20 years of scientific evolution of cyber security: A science mapping. In Proceedings of the International Conference on Industrial Engineering and Operations Management, Dubai, United Arab Emirates, 10–12 March 2020; IEOM Society International: Southfield, MI, USA; pp. 314–325. [Google Scholar]
- Kunwar, R.S.; Sharma, P. Social media: A new vector for cyber attack. In Proceedings of the 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA), Dehradun, India, 8–9 April 2016; IEEE: Piscataway, NJ, USA; pp. 1–5. [Google Scholar]
- Harding, L. The Snowden Files: The Inside Story of the World’s Most Wanted Man; Guardian Faber Publishing: London, UK, 2014. [Google Scholar]
- Daswani, N.; Elbayadi, M. The Yahoo Breaches of 2013 and 2014. In Big Breaches; Apress: Berkeley, CA, USA, 2021; pp. 155–169. [Google Scholar]
- Humayun, M.; Niazi, M.; Jhanjhi, N.Z.; Alshayeb, M.; Mahmood, S. Cyber security threats and vulnerabilities: A systematic mapping study. Arab. J. Sci. Eng. 2020, 45, 3171–3189. [Google Scholar] [CrossRef]
- Wangen, G. The role of malware in reported cyber espionage: A review of the impact and mechanism. Information 2015, 6, 183–211. [Google Scholar] [CrossRef] [Green Version]
- Kettani, H.; Wainwright, P. On the top threats to cyber systems. In Proceedings of the 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT), Kahului, HI, USA, 14–17 March 2019; IEEE: Piscataway, NJ, USA; pp. 175–179. [Google Scholar]
- Mohurle, S.; Patil, M. A brief study of wannacry threat: Ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 2017, 8, 1938–1940. [Google Scholar]
- Varlioglu, S.; Gonen, B.; Ozer, M.; Bastug, M. Is cryptojacking dead after coinhive shutdown? In Proceedings of the 2020 3rd International Conference on Information and Computer Technologies (ICICT), Silicon Valley, CA, USA, 9–12 March 2020; IEEE: Piscataway, NJ, USA; pp. 385–389. [Google Scholar]
- World Economic Forum. The Global Risks Report 2022, 17th ed.; World Economic Forum: Cologny, Switzerland, 2022. [Google Scholar]
- Pardeshi, V.H. Cloud computing for higher education institutes: Architecture, strategy and recommendations for effective adaptation. Procedia Econ. Financ. 2014, 11, 589–599. [Google Scholar] [CrossRef] [Green Version]
- Ananthi, C.M.T.; Arul, L.R.P.J. Implications, Risks and Challenges of Cloud Computing In Academic Field–A State-of-Art. Int. J. Sci. Technol. Res. 2019, 8, 3268–3278. [Google Scholar]
- Corradini, I. Redefining the Approach to Cybersecurity. In Building a Cybersecurity Culture in Organisations; Springer: Cham, Switzerland, 2020; pp. 49–62. [Google Scholar]
- Kaloudi, N.; Li, J. The AI-based cyber threat landscape: A survey. ACM Comput. Surv. (CSUR) 2020, 53, 1–34. [Google Scholar] [CrossRef] [Green Version]
- Meland, P.H.; Bayoumy, Y.F.F.; Sindre, G. The Ransomware-as-a-Service economy within the darknet. Comput. Secur. 2020, 92, 1–9. [Google Scholar] [CrossRef]
- Kahn, A. The 2019 Cybersecurity Threat Landscape. 2019. Available online: https://www.rmahq.org/the-2019-cybersecurity-threat-landscape/ (accessed on 20 February 2022).
- Abomhara, M.; Køien, G.M. Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 2015, 4, 65–88. [Google Scholar] [CrossRef]
- Vorakulpipat, C.; Rattanalerdnusorn, E.; Thaenkaew, P.; Hai, H.D. Recent challenges, trends, and concerns related to IoT security: An evolutionary study. In Proceedings of the 2018 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon, Korea, 11–14 February 2018; IEEE: Piscataway, NJ, USA; pp. 405–410. [Google Scholar]
- Bertino, E. Data Security and Privacy in the IoT. In Proceedings of the 19th International Conference on Extending Database Technology (EDBT): OpenProceedings, Bordeaux, France, 15–16 March 2016; pp. 1–3. [Google Scholar]
- Forestiero, A. Bio-inspired algorithm for outliers detection. Multimed. Tools Appl. 2017, 76, 25659–25677. [Google Scholar] [CrossRef]
- Forestiero, A. Metaheuristic algorithm for anomaly detection in Internet of Things leveraging on a neural-driven multiagent system. Knowl.-Based Syst. 2021, 228, 107241. [Google Scholar] [CrossRef]
- Lamal, P.A. Higher education: Social institution or business? Behav. Soc. Issues 2001, 11, 65–70. [Google Scholar] [CrossRef]
- Kin-Keung, D.C. A comparative study on the corporatisation of higher education in Hong Kong and Singapore. In Social Stratification in Chinese Societies; Brill: Leiden, The Netherlands, 2010; pp. 191–224. [Google Scholar]
- Alexander, F.K. The changing face of accountability: Monitoring and assessing institutional performance in higher education. J. High. Educ. 2000, 71, 411–431. [Google Scholar] [CrossRef]
- Anderson, E.E.; Choobineh, J. Enterprise information security strategies. Comput. Secur. 2008, 27, 22–29. [Google Scholar] [CrossRef]
- Aven, T. On the allegations that small risks are treated out of proportion to their importance. Reliab. Eng. Syst. Saf. 2015, 140, 116–121. [Google Scholar] [CrossRef] [Green Version]
- Olsen, R.V.; Tokerud, S. Teachers’ Awareness, Knowledge and Practice of Information Security in School. Master’s Thesis, University of Agder, Kristiansand, Norway, 2020. Available online: https://hdl.handle.net/11250/2678221 (accessed on 20 February 2022).
- Bojanc, R.; Jerman-Blažič, B. An economic modelling approach to information security risk management. Int. J. Inf. Manag. 2008, 28, 413–422. [Google Scholar] [CrossRef]
- Metalidou, E.; Marinagi, C.; Trivellas, P.; Eberhagen, N.; Giannakopoulos, G.; Skourlas, C. Human factor and information security in higher education. J. Syst. Inf. Technol. 2014, 16, 210–221. [Google Scholar] [CrossRef]
- Parsons, K.; McCormac, A.; Butavicius, M.; Pattinson, M.; Jerram, C. Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput. Secur. 2014, 42, 165–176. [Google Scholar] [CrossRef]
- Parsons, K.; Calic, D.; Pattinson, M.; Butavicius, M.; McCormac, A.; Zwaans, T. The human aspects of information security questionnaire (HAIS-Q): Two further validation studies. Comput. Secur. 2017, 66, 40–51. [Google Scholar] [CrossRef]
- Johnston, A.C.; Hale, R. Improved security through information security governance. Commun. ACM 2009, 52, 126–129. [Google Scholar] [CrossRef]
- Wilkin, C.L.; Chenhall, R.H. A review of IT governance: A taxonomy to inform accounting information systems. J. Inf. Syst. 2010, 24, 107–146. [Google Scholar] [CrossRef]
- Ferguson, C.; Green, P.; Vaswani, R.; Wu, G. Determinants of effective information technology governance. Int. J. Audit. 2013, 17, 75–99. [Google Scholar] [CrossRef]
- Chong, J.L.; Tan, P.; Felix, B. IT governance in collaborative networks: A socio-technical perspective. Pac. Asia J. Assoc. Inf. Syst. 2012, 4, 31–48. [Google Scholar] [CrossRef] [Green Version]
- Nolan, R.; McFarlan, F.W. Information technology and the board of directors. Harv. Bus. Rev. 2005, 83, 96. [Google Scholar]
- Rothrock, R.A.; Kaplan, J.; Van Der Oord, F. The board’s role in managing cybersecurity risks. MIT Sloan Manag. Rev. 2018, 59, 12–15. [Google Scholar]
- Spremić, M.; Šimunic, A. Cyber security challenges in digital economy. In Proceedings of the World Congress on Engineering, London, UK, 4–6 July 2018; International Association of Engineers: Hong Kong, China, 2018; pp. 341–346. [Google Scholar]
- Huang, R.; Zmud, R.W.; Price, R.L. Influencing the effectiveness of IT governance practices through steering committees and communication policies. Eur. J. Inf. Syst. 2010, 19, 288–302. [Google Scholar] [CrossRef]
- Jang-Jaccard, J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973–993. [Google Scholar] [CrossRef]
- Diesch, R.; Pfaff, M.; Krcmar, H. A comprehensive model of information security factors for decision-makers. Comput. Secur. 2020, 92, 101747. [Google Scholar] [CrossRef]
- National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity. 2018. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf (accessed on 20 February 2022).
- Baskerville, R.; Siponen, M. An information security meta-policy for emergent organisations. Logist. Inf. Manag. 2002, 15, 337–346. [Google Scholar] [CrossRef] [Green Version]
- Höne, K.; Eloff, J.H.P. What makes an effective information security policy? Netw. Secur. 2002, 2002, 14–16. [Google Scholar] [CrossRef]
- Doherty, N.F.; Anastasakis, L.; Fulford, H. The information security policy unpacked: A critical study of the content of university policies. Int. J. Inf. Manag. 2009, 29, 449–457. [Google Scholar] [CrossRef] [Green Version]
- Da Veiga, A.; Astakhova, L.V.; Botha, A.; Herselman, M. Defining organisational information security culture—Perspectives from academia and industry. Comput. Secur. 2020, 92, 101713. [Google Scholar] [CrossRef]
- Wiley, A.; McCormac, A.; Calic, D. More than the individual: Examining the relationship between culture and Information Security Awareness. Comput. Secur. 2020, 88, 101640. [Google Scholar] [CrossRef]
- Alshaikh, M. Developing cybersecurity culture to influence employee behavior: A practice perspective. Comput. Secur. 2020, 98, 102003. [Google Scholar] [CrossRef]
- Fennelly, L.J.; Perry, M.A. Chapter 35-Building a Sustainable Culture of Security. In The Professional Protection Officer; Davies, S.J., Fennelly, L.J., Eds.; Butterworth-Heinemann: Boston, UK, 2020; pp. 397–401. [Google Scholar]
- Coffey, J.W.; Haveard, M.; Golding, G. A case study in the implementation of a human-centric higher education cybersecurity program. J. Cybersecur. Educ. Res. Pract. 2018, 2018, 4. [Google Scholar]
- Wenger, E. Communities of Practice: Learning, Meaning and Identity; Cambridge University Press: Cambridge, UK, 2000. [Google Scholar]
- Bécue, A.; Praça, I.; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artif. Intell. Rev. 2021, 54, 3849–3886. [Google Scholar] [CrossRef]
- Pandya, P. Chapter e16-Local Area Network Security. In Computer and Information Security Handbook, 3rd ed.; Vacca, J.R., Ed.; Morgan Kaufmann: Burlington, MA, USA, 2013; pp. e1–e20. [Google Scholar]
- Alhawi, O.M.K.; Baldwin, J.; Dehghantanha, A. Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection. In Cyber Threat Intelligence; Dehghantanha, A., Conti, M., Dargahi, T., Eds.; Springer: Cham, Switzerland, 2018; pp. 93–106. [Google Scholar]
- Guha Roy, D.; Srirama, S.N. A Blockchain-based Cyber Attack Detection Scheme for Decentralised Internet of Things using Software-Defined Network. Softw. Pract. Exp. 2021, 51, 1540–1556. [Google Scholar] [CrossRef]
- Al-Abassi, A.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M. An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 2020, 8, 83965–83973. [Google Scholar] [CrossRef]
- Zhan, Z.; Xu, M.; Xu, S. Predicting cyber attack rates with extreme values. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1666–1677. [Google Scholar] [CrossRef]
- Taddeo, M.; McCutcheon, T.; Floridi, L. Trusting artificial intelligence in cybersecurity is a double-edged sword. Nat. Mach. Intell. 2019, 1, 557–560. [Google Scholar] [CrossRef] [Green Version]
- Radha, V.; Reddy, D.H. A survey on single sign-on techniques. Procedia Technol. 2012, 4, 134–139. [Google Scholar] [CrossRef] [Green Version]
- Boonkrong, S. Multi-factor Authentication. In Authentication and Access Control: Practical Cryptography Methods and Tools; Apress: Berkeley, CA, USA, 2021; pp. 133–162. [Google Scholar]
- Das, S.; Wang, B.; Tingle, Z.; Camp, L.J. Evaluating user perception of multi-factor authentication: A systematic review. arXiv 2019, arXiv:1908.05901. [Google Scholar]
- Goettl, C. Is ransomware winning? Cyber Secur. A Peer-Rev. J. 2021, 5, 51–65. [Google Scholar]
- Arfaoui, A.; Cherkaoui, S.; Kribeche, A.; Senouci, S.M.; Hamdi, M. Context-aware adaptive authentication and authorisation in Internet of Things. In Proceedings of the ICC 2019-2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Fayad, A.; Hammi, B.; Khatoun, R. An adaptive authentication and authorisation scheme for IoT’s gateways: A blockchain based approach. In Proceedings of the 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, 18–19 October 2018; IEEE: Piscataway, NJ, USA; pp. 1–7. [Google Scholar]
- Arias-Cabarcos, P.; Krupitzer, C.; Becker, C. A survey on adaptive authentication. ACM Comput. Surv. 2020, 52, 1–30. [Google Scholar] [CrossRef] [Green Version]
- Bick, A.; Blandin, A.; Mertens, K. Work from Home before and after the COVID-19 Outbreak. 2021. Available online: https://ssrn.com/abstract=3786142 (accessed on 20 February 2022).
- Munro, K. Desktop encryption. Netw. Secur. 2008, 2008, 4–6. [Google Scholar] [CrossRef]
- Usmonov, B.; Evsutin, O.; Iskhakov, A.; Shelupanov, A.; Iskhakova, A.; Meshcheryakov, R. The cybersecurity in development of IoT embedded technologies. In Proceedings of the 2017 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2–4 November 2017; IEEE: Piscataway, NJ, USA; pp. 1–4. [Google Scholar]
- Boehm, J.; Curcio, N.; Merrath, P.; Shenton, L.; Stähle, T. The Risk-Based Approach to Cybersecurity; McKinsey & Company: New York, NY, USA, 2019. [Google Scholar]
- Petrenko, S.A.; Makoveichuk, K.A. Big data technologies for cybersecurity. In Proceedings of the CEUR Workshop Proceedings 2081 CEUR-WS.org, Moscow, Russia, 6–7 December 2017; Sun SITE Central Europe: Aachen, Germany, 2017; pp. 107–111. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cheng, E.C.K.; Wang, T. Institutional Strategies for Cybersecurity in Higher Education Institutions. Information 2022, 13, 192. https://doi.org/10.3390/info13040192
Cheng ECK, Wang T. Institutional Strategies for Cybersecurity in Higher Education Institutions. Information. 2022; 13(4):192. https://doi.org/10.3390/info13040192
Chicago/Turabian StyleCheng, Eric C. K., and Tianchong Wang. 2022. "Institutional Strategies for Cybersecurity in Higher Education Institutions" Information 13, no. 4: 192. https://doi.org/10.3390/info13040192
APA StyleCheng, E. C. K., & Wang, T. (2022). Institutional Strategies for Cybersecurity in Higher Education Institutions. Information, 13(4), 192. https://doi.org/10.3390/info13040192