skip to main content
10.1145/3551504.3551516acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceeegovConference Proceedingsconference-collections
research-article

The Holistic Approach to Cybersecurity in Academia

Published: 25 October 2022 Publication History

Abstract

Academic institutions are increasingly implementing digital services and new technologies, for a modern and accessible educational environment. But the virtual environment creates unknown vulnerabilities that need to be addressed properly. The holistic approach to cybersecurity in academia as a system has major benefits. But the main question is how this can be done in practice, as long as universities are heterogeneous complex environments. The proposed solution can be used to implement a security system in academia, is compliant with the security standard ISO 27001 and developed by applying the scientific method of Security Requirement Engineering.

References

[1]
Xin Huang, Paul Craig, Hangyu Lin, and Zheng Yan. 2016. SecIoT: a security framework for the Internet of Things. In Security and Communication Networks, vol. 9, no. 16, pp. 3083–3094.
[2]
Arina Alexei, and Anatolie Alexei. 2021. Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance. In International Journal of Scientific & Technology Research, vol. 10, no. 3, pp. 128–133
[3]
Julian Jang-Jaccard, and Surya Nepal. 2014. A survey of emerging threats in cybersecurity. In Journal of Computer and System Sciences, vol. 80, no. 5, pp. 973–993.
[4]
Arina Alexei. 2021. Ensuring information security in public organizations in the Republic of Moldova through the ISO 27001 standard. In Journal of Social Sciences, vol. IV(1).
[5]
Arina Alexei, and Anatolie Alexei. 2021. Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance Learning. In International Journal of Scientific & Technology Research, vol. 10, no. 3.
[6]
Manal M. Yunis, and Kai S. Koong. 2015. Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework. In AMCIS.
[7]
Alessandro Oltramari, Noam Ben-Asher, Lorrie Cranor, Lujo Bauer, and Nicolas Christin. 2014. General Requirements of a Hybrid-Modeling Framework for Cyber Security. In 2014 IEEE Military Communications Conference, pp. 129-135.
[8]
Arina Alexei. 2022. Design & development of a cyber security conceptual framework for higher education institutions in the Republic of Moldova. In Scientific and Practical Cyber Security Journal (SPCSJ), vol. 6, no. 1, pp. 35–52.
[9]
Huma Rehman, Ashraf Masood, and Ahmad Raza Cheema. 2013. Information Security Management in academic institutes of Pakistan. In 2013 2nd National Conference on Information Assurance (NCIA).
[10]
Noran Shafik Fouad. 2021. Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. In Journal of Cyber Policy, vol. 6, no. 2, pp. 137–154.
[11]
Biswajit Panja, Dennis Fattaleh, Mark Mercado, Adam Robinson, Priyanka Meharia. 2013. Cybersecurity in banking and financial sector: Security analysis of a mobile banking application. In 2013 International Conference on Collaboration Technologies and Systems (CTS), pp. 397–403.
[12]
Lynne Coventry, and Dawn Branley. 2018. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. In Maturitas, vol. 113, pp. 48–52.
[13]
Uchenna Daniel Ani, Hongmei He, and Ashutosh Tiwari. 2019. Human factor security: evaluating the cybersecurity capacity of the industrial workforce. In Journal of Systems and Information Technology, vol. 21, no. 1, pp. 2–35.
[14]
Robert Müller-Török, and Alexander Prosser. 2021. Teaching requirements of a digitised public administration. In Pro Publico Bono - Magyar Közigazgatás, vol. 9, no. 1, pp. 2–15.
[15]
Arina Alexei. 2021. Network security threats to higher education institutions. In CEE e|Dem and e|Gov Days, pp. 323–333.
[16]
Ross Brewer 2016. Ransomware attacks: detection, prevention and cure. In Network Security, vol. 2016, no. 9.
[17]
Juan Fernando Balarezo, Song Wang, Karina Gomez Chavez, Akram Al-Hourani, and Sithamparanathan Kandeepan. 2022. A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. In Engineering Science and Technology, an International Journal, vol. 31, p. 101065.
[18]
Edyta Karolina Szczepaniuk, Hubert Szczepaniuk, Tomasz Rokicki, and Bogdan Klepacki. 2020. Information security assessment in public administration. In Computers and Security, vol. 90, p. 101709.
[19]
Robert I. MacCuspie, Harvey Hyman, Chris Yakymyshyn, Sesha S.Srinivasan, Jaspreet Dhau, and Christina Drake. 2014. A framework for identifying performance targets for sustainable nanomaterials. In Sustainable Materials and Technologies, vol. 1–2, pp. 17–25.
[20]
Bichanga Walter Okibo, and Obara Brigit Ochiche. 2014. Challenges Facing Information Systems Security Management in Higher Learning Institutions: A Case Study of the Catholic University of Eastern Africa – Kenya. In International Journal of Management Excellence, vol. 3, no. 1, pp. 336–349.
[21]
Ivano Bongiovanni. 2019. The least secure places in the universe? A systematic literature review on information security management in higher education. Computers and Security, vol. 86, pp. 350–357.
[22]
Jorge Merchan-Lima, Fabian Astudillo-Salinas, Luis Tello-Oquendo, Franklin Sanchez, Gabriel Lopez-Fonseca and Dorys Quiroz. 2020. Information security management frameworks and strategies in higher education institutions: a systematic review. In Annals of Telecommunications.
[23]
Neil Francis Doherty, Leonidas Anastasakis, and Heather Fulford. 2011. Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy. In International Journal of Information Management, vol. 31, no. 3, pp. 201–209.
[24]
Alin-Ciprian Cojocariu, Ion Verzea, and Rachid Chaib. 2020. Aspects of Cyber-Security in Higher Education Institutions. In Innovation in Sustainable Management and Entrepreneurship, pp. 3–11.
[25]
Council of the European Union and European Parliament. 2016. Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Retrieved February 28, 2021 from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016L1148)
[26]
ISO/IEC 27001: Information Security Management. International Organization for Standardization,” Geneva, Switzerland, 2013. Retrieved December 02, 2021 from https://www.iso.org/isoiec-27001-information-security.html
[27]
George Disterer. 2013. ISO/IEC 27000, 27001 and 27002 for Information Security Management. In Journal of Information Security, vol. 04, no. 02.
[28]
Abbass Asosheh, Parvaneh Hajinazari, and Hourieh Khodkari. 2013. A practical implementation of ISMS. In 7th International Conference on e-Commerce in Developing Countries: with focus on e-Security, 2013, pp. 1-17.
[29]
Veliko Ivanov, Monika Tzaneva, Alexandra Murdjeva, and Valentin Kisimov. 2011. Securing the Core University Business Processes. In Camenisch, J., Kisimov, V., Dubovitskaya, M. (eds) Open Research Problems in Network Security. iNetSec 2010. Lecture Notes in Computer Science, vol 6555. Springer, Berlin, Heidelberg.
[30]
Daniel Mellado, Eduardo Fernández-Medina, and Mario Piattini. 2006. Applying a Security Requirements Engineering Process. In Gollmann, D., Meier, J., Sabelfeld, A. (eds) Computer Security – ESORICS 2006. ESORICS 2006. Lecture Notes in Computer Science, vol 4189. Springer, Berlin, Heidelberg.
[31]
Kristian Beckers, Stephan Fabbender, Maritta Heisel, and Holger Schmidt. 2012. Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. In 2012 Seventh International Conference on Availability, Reliability and Security, pp. 242–248.
[32]
Shafiq Ur Rehman, and Volker Gruhn. 2018. An Effective Security Requirements Engineering Framework for Cyber-Physical Systems. In Technologies (Basel), vol. 6, no. 3, p. 65.
[33]
Shafiq Ur Rehman, Christopher Allgaier, and Volker Gruhn. 2018. Security Requirements Engineering: A Framework for Cyber-Physical Systems. In 2018 International Conference on Frontiers of Information Technology (FIT), pp. 315-320.

Index Terms

  1. The Holistic Approach to Cybersecurity in Academia
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        CEEeGov '22: Proceedings of the Central and Eastern European eDem and eGov Days
        September 2022
        192 pages
        ISBN:9781450397667
        DOI:10.1145/3551504
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 25 October 2022

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        CEEeGov '22
        CEEeGov '22: Central and Eastern European eDem and eGov Days
        September 22 - 23, 2022
        Budapest, Hungary

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 65
          Total Downloads
        • Downloads (Last 12 months)22
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Jan 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media