Review on Major Cyber security Issues in Educational Sector
DOI:
https://doi.org/10.26438/ijcse/v9i12.2629Keywords:
Threats, Virtual learning Environmen, Issues, , E-LearningAbstract
The demand for information security in higher education will continue to grow. A lack of risk management has already resulted in catastrophic data breaches, and these incidents are expected to continue. Academics, students, and universities around the world have been subjected to a constant torrent of attacks. This study relies on a review of several educational surveys. As a result of this research, new lines of study will be opened up for higher education security. Various sources have been analysed in this report to provide an overview of cyber security challenges. We categorise our review mostly based on the research questions that we address. In order to gain a foothold in the educational community, it will be beneficial to both corporations and academics.
References
[1] Bongiovanni, I. The least secure places in the universe? A systematic literature review on information security management in higher education. Comput. Secur. 86, 350–357, 2019.
[2]Report on Business-standard. Available on: https://www.business-standard.com/article/technology/indian-tops-global-cyber-attacks-on-education-sector-report-121081801000_1.html
[3] FireEye, Inc. Cyber tHreats to the Education Industry. White Paper, 2016. Library Catalog. Available online: www.fireeye.com (accessed on 28 January 2021).
[4] Adams A; Blanford," A. Security and Online Learning: To Protect and Prohibit. In Usability Evaluation Of Online Learning Programs"; IGI Global: Hershey, PA, USA, pp. 331–359, 2003.
[5] J. ChapmanHow Safe Is Your Data? Cyber-Security in Higher Education. HEPI Policy Note, April ISO/IEC 27002:2013 Information Technology–Security Techniques–Information Security Risk Management; Standard; InternationalOrganization for Standardization: Geneva, Switzerland, 2018.
[6] G.Wangen,C.Hallstensen ,E.Snekkenes "A framework for estimating information security risk assessment method completeness.Int. J. Inf. Secur. 2017.
[7] J. Chapman "How Safe Is Your Data? Cyber-Security in Higher Education". HEPI Policy Note, April 2019.
[8] M. Whitman, H. Mattord, "Threats to Information Protection-Industry and Academic Perspectives: An annotated bibliography". J.Cybersecur. Educ. Res. Pract. 2016.
[9] K.Beaudin," The Legal Implications of Storing Student Data: Preparing for and Responding to Data Breaches".New Dir. InstitutionalRes. 37–48, 2017.
[10] K.Beaudi"College and university data breaches: Regulating higher education cybersecurity under state and federal law". J. Coll.Univ. Law 41, 657–693, 2015.
[11] H.S. Hussain,R.Din,N.Z Khidzir, K.A.M Daud, S.Ahmad, " Risk and Threat via Online Social Network among Academia at Higher Education". J. Physics: Conf. Ser. 1018, 012008 , 2018.
[12] I. Ajie, "A Review of Trends and Issues of Cybersecurity in Academic Libraries". Libr. Philos. Pract1–20. Available online:https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=5803&context=libphilprac (accessed on 28 January 2021).
[13] A.Diaz, A.T Sherman,A. Joshi, "Phishing in an Academic Community: A Study of User Susceptibility and Behavior". arXiv: 1811.06078, 2018.
[14] T. Cuchta, B. Blackwood, T.R Devine, R.J Niichel , K.M. Daniels, C.H.Lutjens, S. Maibach, R. J Stephenson. "Human Risk Factors in Cybersecurity". In Proceedings of the 20th Annual SIG Conference on Information Technology Education, Tacoma, WA,USA, 3–5 October; pp. 87–92, 2019.
[15] M. Dadkhah, G. Borchardt, T. Maliszewski, ,"Fraud in Academic Publishing: Researchers Under Cyber-Attacks". Am. J. Med. 130, 27–30, 2017.
[16] D. Teixeira ,J.Silva, A.Alkhatib, Tsigaris, P. "Spam emails in academia: Issues and costs". Scientometrics 122, 1171–1181, 2020.
[17] G. Wangen, N. Hellesen, H.Torres, E. Brækken, "An empirical study of root-cause analysis in information security management ".In Proceedings of the SECURWARE-The Eleventh International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA), Rome, Italy, 10–14 September 2017.
[18] H. Kashiwazaki, "Personal Information Leak in a University, and Its Cleanup". In Proceedings of the 2018 ACM SIGUCCS Annual Conference; Association for Computing Machinery: New York, NY, USA,; pp. 43–50, 2018.
[19] A.Deepa E. C. Blessie,”Input Analysis for Accreditation Prediction in Higher Education Sector by Using Gradient Boosting Algorithm”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.3, pp.23- 27, 2018.
[20]A Survey on Impact of IoT Enabled E – Learning Services, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.178-183, 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
