Skip to main content

Cybersecurity Imminent Threats with Solutions in Higher Education

  • Conference paper
  • First Online:
Recent Trends in Intelligence Enabled Research (DoSIER 2022)

Abstract

With better education, there would be a greater need for factual preservation. Without adequate threat management, serious record breaches have already happened and are probably going to happen again. By reviewing the recent literature on acknowledged assets, risk occurrences, risk actors, and vulnerabilities in better training, it is possible to deduce the effect of cyberattacks in society. The review included studies as well as projects to increase our understanding of the primary cybersecurity threat domains. The top spot has shifted due to the paucity of empirical research on cybersecurity threats in higher education as well as large gaps in the literature despite this issue, some of the publications which are examined spent too much time explaining cybersecurity-related concepts. The top-level view of mission-critical assets, regular risk events, a widely accepted risk model, and an overview of not uncommon cybersecurity vulnerabilities are all combined in this document. Strategic cyber risks are summarized in this report with descriptions of frequency distributions and starting points for protection researchers in higher education.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adams, A., Blanford, A.: Security and online learning: to protect and prohibit. In: Usability Evaluation of Online Learning Programs, pp. 331–359. IGI Global, Hershey, PA, USA (2003)

    Google Scholar 

  2. Kaspersky: Digital education: The cyber risks of the online classroom (2020)

    Google Scholar 

  3. Banik, D., Ekbal, A., Bhattacharyya, P.: Statistical machine translation based on weighted syntax–semantics. Sādhanā 45(1), 1–12 (2020)

    Article  Google Scholar 

  4. Mello, S.: Data Breaches in higher education institutions. In: Honors Theses and Capstones. University of New Hampshire, Durham, NH, USA (2018)

    Google Scholar 

  5. Elgelany, A., Gaoud, W.: Cloud computing: empirical studies in higher education a literature review. Int. J. Adv. Comput. Sci. Appl. 8(10), 121–127 (2017). https://doi.org/10.14569/IJACSA.2017.081017

    Article  Google Scholar 

  6. ISO/IEC 27002:2013 Information technology—Security techniques—Code of practice for information security controls. Standard; International Organization for Standardization, Geneva, Switzerland (2014)

    Google Scholar 

  7. Banik, D., Ekbal, A., Bhattacharyya, P., Bhattacharyya, S., Platos, J.: Statistical- based system combination approach to gain advantages over different machine translation systems. Heliyon 5(9), e02504 (2019)

    Article  Google Scholar 

  8. Pardeshi, V.H.: Cloud Computing for Higher Education Institutes

    Google Scholar 

  9. Banik, D.: Phrase table re-adjustment for statistical machine translation. Int. J. Speech Technol. 24(4), 903–911 (2021)

    Article  Google Scholar 

  10. Ahmed, A.E.A., Badawy, M., Hefny, H.: Exploring and measuring the key performance indicators in higher education institutions. Int. J. Intell. Comput. Inf. Sci. 18, 37–47 (2018) (Google Scholar)

    Google Scholar 

  11. Wangen, G.: Quantifying and analyzing information security risk from incident data; graphical models for security, pp. 129–154. In: Albanese, M., Horne, R., Probst, C.W. (eds.) Springer, Cham, Switzerland, London, UK (2019)

    Google Scholar 

  12. Whitman, M.: Management of Information Security. Cengage Learning, Inc., Boston, MA, USA (2018). ISBN 9780357691205 (Google Scholar)

    Google Scholar 

  13. Banik, D., Ekbal, A., Bhattacharyya, P.: Wuplebleu: the wordnet-based evaluation metric for machine translation. In: 15th International Conference on Natural Language Processing, p. 104 (2018)

    Google Scholar 

  14. Ulven, J.: High level information security risk in higher education. Master’s thesis, Norwegian University of Science and Technology, Trondheim, Norway (2020) (Google Scholar)

    Google Scholar 

  15. Beaudin, K.: College and university data breaches: regulating higher education cybersecurity under state and federal law. J. Coll. Univ. Law 41, 657–693 (2015)

    Google Scholar 

  16. Banerjee, A., Banik, D.: (2022) Pooled hybrid-spectral for hyperspectral image classification. In: Multimedia Tools and Applications, pp. 1–13

    Google Scholar 

  17. .ISO/IEC 27002:2013 Information technology—Security techniques—Information security risk management; standard. International Organization for Standardization, Geneva, Switzerland (2018)

    Google Scholar 

  18. ISO/IEC 27002:2013 Information Technology—Security techniques—Code of practice for information security controls. Standard; International Organization for Standardization

    Google Scholar 

  19. Wangen, G., Halstensen, C., Snekkenes, E.: A framework for estimating security risk assessment method completeness

    Google Scholar 

  20. Internet World Stats: Internet penetration in Asia December 31, 2013. In: Jones, H.B., Heinrichs, R.L. (eds.) (2012) Do business students practice smartphone security? J Comput Inf Syst 22–30. 14. Kshetri, N. (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debajyoty Banik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gourisaria, M.K., Chufare, A.T., Banik, D. (2023). Cybersecurity Imminent Threats with Solutions in Higher Education. In: Bhattacharyya, S., Das, G., De, S., Mrsic, L. (eds) Recent Trends in Intelligence Enabled Research. DoSIER 2022. Advances in Intelligent Systems and Computing, vol 1446. Springer, Singapore. https://doi.org/10.1007/978-981-99-1472-2_4

Download citation

Publish with us

Policies and ethics