The Holistic Approach to Cybersecurity in Academia
Pages 106 - 111
Abstract
Academic institutions are increasingly implementing digital services and new technologies, for a modern and accessible educational environment. But the virtual environment creates unknown vulnerabilities that need to be addressed properly. The holistic approach to cybersecurity in academia as a system has major benefits. But the main question is how this can be done in practice, as long as universities are heterogeneous complex environments. The proposed solution can be used to implement a security system in academia, is compliant with the security standard ISO 27001 and developed by applying the scientific method of Security Requirement Engineering.
References
[1]
Xin Huang, Paul Craig, Hangyu Lin, and Zheng Yan. 2016. SecIoT: a security framework for the Internet of Things. In Security and Communication Networks, vol. 9, no. 16, pp. 3083–3094.
[2]
Arina Alexei, and Anatolie Alexei. 2021. Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance. In International Journal of Scientific & Technology Research, vol. 10, no. 3, pp. 128–133
[3]
Julian Jang-Jaccard, and Surya Nepal. 2014. A survey of emerging threats in cybersecurity. In Journal of Computer and System Sciences, vol. 80, no. 5, pp. 973–993.
[4]
Arina Alexei. 2021. Ensuring information security in public organizations in the Republic of Moldova through the ISO 27001 standard. In Journal of Social Sciences, vol. IV(1).
[5]
Arina Alexei, and Anatolie Alexei. 2021. Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance Learning. In International Journal of Scientific & Technology Research, vol. 10, no. 3.
[6]
Manal M. Yunis, and Kai S. Koong. 2015. Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework. In AMCIS.
[7]
Alessandro Oltramari, Noam Ben-Asher, Lorrie Cranor, Lujo Bauer, and Nicolas Christin. 2014. General Requirements of a Hybrid-Modeling Framework for Cyber Security. In 2014 IEEE Military Communications Conference, pp. 129-135.
[8]
Arina Alexei. 2022. Design & development of a cyber security conceptual framework for higher education institutions in the Republic of Moldova. In Scientific and Practical Cyber Security Journal (SPCSJ), vol. 6, no. 1, pp. 35–52.
[9]
Huma Rehman, Ashraf Masood, and Ahmad Raza Cheema. 2013. Information Security Management in academic institutes of Pakistan. In 2013 2nd National Conference on Information Assurance (NCIA).
[10]
Noran Shafik Fouad. 2021. Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. In Journal of Cyber Policy, vol. 6, no. 2, pp. 137–154.
[11]
Biswajit Panja, Dennis Fattaleh, Mark Mercado, Adam Robinson, Priyanka Meharia. 2013. Cybersecurity in banking and financial sector: Security analysis of a mobile banking application. In 2013 International Conference on Collaboration Technologies and Systems (CTS), pp. 397–403.
[12]
Lynne Coventry, and Dawn Branley. 2018. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. In Maturitas, vol. 113, pp. 48–52.
[13]
Uchenna Daniel Ani, Hongmei He, and Ashutosh Tiwari. 2019. Human factor security: evaluating the cybersecurity capacity of the industrial workforce. In Journal of Systems and Information Technology, vol. 21, no. 1, pp. 2–35.
[14]
Robert Müller-Török, and Alexander Prosser. 2021. Teaching requirements of a digitised public administration. In Pro Publico Bono - Magyar Közigazgatás, vol. 9, no. 1, pp. 2–15.
[15]
Arina Alexei. 2021. Network security threats to higher education institutions. In CEE e|Dem and e|Gov Days, pp. 323–333.
[16]
Ross Brewer 2016. Ransomware attacks: detection, prevention and cure. In Network Security, vol. 2016, no. 9.
[17]
Juan Fernando Balarezo, Song Wang, Karina Gomez Chavez, Akram Al-Hourani, and Sithamparanathan Kandeepan. 2022. A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. In Engineering Science and Technology, an International Journal, vol. 31, p. 101065.
[18]
Edyta Karolina Szczepaniuk, Hubert Szczepaniuk, Tomasz Rokicki, and Bogdan Klepacki. 2020. Information security assessment in public administration. In Computers and Security, vol. 90, p. 101709.
[19]
Robert I. MacCuspie, Harvey Hyman, Chris Yakymyshyn, Sesha S.Srinivasan, Jaspreet Dhau, and Christina Drake. 2014. A framework for identifying performance targets for sustainable nanomaterials. In Sustainable Materials and Technologies, vol. 1–2, pp. 17–25.
[20]
Bichanga Walter Okibo, and Obara Brigit Ochiche. 2014. Challenges Facing Information Systems Security Management in Higher Learning Institutions: A Case Study of the Catholic University of Eastern Africa – Kenya. In International Journal of Management Excellence, vol. 3, no. 1, pp. 336–349.
[21]
Ivano Bongiovanni. 2019. The least secure places in the universe? A systematic literature review on information security management in higher education. Computers and Security, vol. 86, pp. 350–357.
[22]
Jorge Merchan-Lima, Fabian Astudillo-Salinas, Luis Tello-Oquendo, Franklin Sanchez, Gabriel Lopez-Fonseca and Dorys Quiroz. 2020. Information security management frameworks and strategies in higher education institutions: a systematic review. In Annals of Telecommunications.
[23]
Neil Francis Doherty, Leonidas Anastasakis, and Heather Fulford. 2011. Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy. In International Journal of Information Management, vol. 31, no. 3, pp. 201–209.
[24]
Alin-Ciprian Cojocariu, Ion Verzea, and Rachid Chaib. 2020. Aspects of Cyber-Security in Higher Education Institutions. In Innovation in Sustainable Management and Entrepreneurship, pp. 3–11.
[25]
Council of the European Union and European Parliament. 2016. Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Retrieved February 28, 2021 from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016L1148)
[26]
ISO/IEC 27001: Information Security Management. International Organization for Standardization,” Geneva, Switzerland, 2013. Retrieved December 02, 2021 from https://www.iso.org/isoiec-27001-information-security.html
[27]
George Disterer. 2013. ISO/IEC 27000, 27001 and 27002 for Information Security Management. In Journal of Information Security, vol. 04, no. 02.
[28]
Abbass Asosheh, Parvaneh Hajinazari, and Hourieh Khodkari. 2013. A practical implementation of ISMS. In 7th International Conference on e-Commerce in Developing Countries: with focus on e-Security, 2013, pp. 1-17.
[29]
Veliko Ivanov, Monika Tzaneva, Alexandra Murdjeva, and Valentin Kisimov. 2011. Securing the Core University Business Processes. In Camenisch, J., Kisimov, V., Dubovitskaya, M. (eds) Open Research Problems in Network Security. iNetSec 2010. Lecture Notes in Computer Science, vol 6555. Springer, Berlin, Heidelberg.
[30]
Daniel Mellado, Eduardo Fernández-Medina, and Mario Piattini. 2006. Applying a Security Requirements Engineering Process. In Gollmann, D., Meier, J., Sabelfeld, A. (eds) Computer Security – ESORICS 2006. ESORICS 2006. Lecture Notes in Computer Science, vol 4189. Springer, Berlin, Heidelberg.
[31]
Kristian Beckers, Stephan Fabbender, Maritta Heisel, and Holger Schmidt. 2012. Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. In 2012 Seventh International Conference on Availability, Reliability and Security, pp. 242–248.
[32]
Shafiq Ur Rehman, and Volker Gruhn. 2018. An Effective Security Requirements Engineering Framework for Cyber-Physical Systems. In Technologies (Basel), vol. 6, no. 3, p. 65.
[33]
Shafiq Ur Rehman, Christopher Allgaier, and Volker Gruhn. 2018. Security Requirements Engineering: A Framework for Cyber-Physical Systems. In 2018 International Conference on Frontiers of Information Technology (FIT), pp. 315-320.
Index Terms
- The Holistic Approach to Cybersecurity in Academia
Index terms have been assigned to the content through auto-classification.
Recommendations
Industry---academia collaboration in fuel cells: a perspective from paper and patent analysis
This study explores current collaboration trend between industry and academic institutions in fuel cells by examining collaborative papers and patents during the period 1991---2010. Papers and patents from industry---academia collaboration (IAC) are ...
Comments
Information & Contributors
Information
Published In
September 2022
192 pages
ISBN:9781450397667
DOI:10.1145/3551504
Copyright © 2022 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 25 October 2022
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
CEEeGov '22
CEEeGov '22: Central and Eastern European eDem and eGov Days
September 22 - 23, 2022
Budapest, Hungary
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 65Total Downloads
- Downloads (Last 12 months)22
- Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format