Abstract
With better education, there would be a greater need for factual preservation. Without adequate threat management, serious record breaches have already happened and are probably going to happen again. By reviewing the recent literature on acknowledged assets, risk occurrences, risk actors, and vulnerabilities in better training, it is possible to deduce the effect of cyberattacks in society. The review included studies as well as projects to increase our understanding of the primary cybersecurity threat domains. The top spot has shifted due to the paucity of empirical research on cybersecurity threats in higher education as well as large gaps in the literature despite this issue, some of the publications which are examined spent too much time explaining cybersecurity-related concepts. The top-level view of mission-critical assets, regular risk events, a widely accepted risk model, and an overview of not uncommon cybersecurity vulnerabilities are all combined in this document. Strategic cyber risks are summarized in this report with descriptions of frequency distributions and starting points for protection researchers in higher education.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, A., Blanford, A.: Security and online learning: to protect and prohibit. In: Usability Evaluation of Online Learning Programs, pp. 331–359. IGI Global, Hershey, PA, USA (2003)
Kaspersky: Digital education: The cyber risks of the online classroom (2020)
Banik, D., Ekbal, A., Bhattacharyya, P.: Statistical machine translation based on weighted syntax–semantics. Sādhanā 45(1), 1–12 (2020)
Mello, S.: Data Breaches in higher education institutions. In: Honors Theses and Capstones. University of New Hampshire, Durham, NH, USA (2018)
Elgelany, A., Gaoud, W.: Cloud computing: empirical studies in higher education a literature review. Int. J. Adv. Comput. Sci. Appl. 8(10), 121–127 (2017). https://doi.org/10.14569/IJACSA.2017.081017
ISO/IEC 27002:2013 Information technology—Security techniques—Code of practice for information security controls. Standard; International Organization for Standardization, Geneva, Switzerland (2014)
Banik, D., Ekbal, A., Bhattacharyya, P., Bhattacharyya, S., Platos, J.: Statistical- based system combination approach to gain advantages over different machine translation systems. Heliyon 5(9), e02504 (2019)
Pardeshi, V.H.: Cloud Computing for Higher Education Institutes
Banik, D.: Phrase table re-adjustment for statistical machine translation. Int. J. Speech Technol. 24(4), 903–911 (2021)
Ahmed, A.E.A., Badawy, M., Hefny, H.: Exploring and measuring the key performance indicators in higher education institutions. Int. J. Intell. Comput. Inf. Sci. 18, 37–47 (2018) (Google Scholar)
Wangen, G.: Quantifying and analyzing information security risk from incident data; graphical models for security, pp. 129–154. In: Albanese, M., Horne, R., Probst, C.W. (eds.) Springer, Cham, Switzerland, London, UK (2019)
Whitman, M.: Management of Information Security. Cengage Learning, Inc., Boston, MA, USA (2018). ISBN 9780357691205 (Google Scholar)
Banik, D., Ekbal, A., Bhattacharyya, P.: Wuplebleu: the wordnet-based evaluation metric for machine translation. In: 15th International Conference on Natural Language Processing, p. 104 (2018)
Ulven, J.: High level information security risk in higher education. Master’s thesis, Norwegian University of Science and Technology, Trondheim, Norway (2020) (Google Scholar)
Beaudin, K.: College and university data breaches: regulating higher education cybersecurity under state and federal law. J. Coll. Univ. Law 41, 657–693 (2015)
Banerjee, A., Banik, D.: (2022) Pooled hybrid-spectral for hyperspectral image classification. In: Multimedia Tools and Applications, pp. 1–13
.ISO/IEC 27002:2013 Information technology—Security techniques—Information security risk management; standard. International Organization for Standardization, Geneva, Switzerland (2018)
ISO/IEC 27002:2013 Information Technology—Security techniques—Code of practice for information security controls. Standard; International Organization for Standardization
Wangen, G., Halstensen, C., Snekkenes, E.: A framework for estimating security risk assessment method completeness
Internet World Stats: Internet penetration in Asia December 31, 2013. In: Jones, H.B., Heinrichs, R.L. (eds.) (2012) Do business students practice smartphone security? J Comput Inf Syst 22–30. 14. Kshetri, N. (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gourisaria, M.K., Chufare, A.T., Banik, D. (2023). Cybersecurity Imminent Threats with Solutions in Higher Education. In: Bhattacharyya, S., Das, G., De, S., Mrsic, L. (eds) Recent Trends in Intelligence Enabled Research. DoSIER 2022. Advances in Intelligent Systems and Computing, vol 1446. Springer, Singapore. https://doi.org/10.1007/978-981-99-1472-2_4
Download citation
DOI: https://doi.org/10.1007/978-981-99-1472-2_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1471-5
Online ISBN: 978-981-99-1472-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)