ICT Security Tools and Techniques among Higher Education Institutions: A Critical Review

被引:0
作者
Nuñez M. [1 ,2 ]
Palmer X.-L. [3 ]
Potter L. [3 ]
Aliac C.J. [4 ]
Velasco L.C. [1 ,5 ]
机构
[1] Mindanao State University Iligan Institute of Technology, Iligan City
[2] CyTech USA LLC, Denver, CO
[3] Old Dominion University, Norfolk, VA
[4] Cebu Institute of Technology University, Cebu City
[5] Premiere Research Institute of Science and Mathematics Center for Computational Analytics and Modelling, Iligan City
关键词
cybersecurity; higher education institutions; information security; IT governance;
D O I
10.3991/ijet.v18i15.40673
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories with specific ways to protect ICT security. HEIs also implement general security standards and guidelines, such as the ISO 27000-series and Center for Internet Security (CIS) controls, in their framework. Through synthesis and analysis of ICT security tools and techniques among HEIs, this critical review hopes to provide research directions on IT governance that academic and technical administrators can further explore to secure their information resources. © 2023 by the authors of this article. Published under CC-BY.
引用
收藏
页码:4 / 22
页数:18
相关论文
共 50 条
[1]  
Magomelo M., Mamboko P., Tsokota T., The Status of Information Security Governance within State Universities in Zimbabwe, 5, 8, (2014)
[2]  
Marcial D. E., IT Security In The Higher Education Institutions, J. Inform, 8, 1, (2012)
[3]  
Liu X., Design and Development of a Web-based Platform to Manage Information Resources security in Higher Education, (2018)
[4]  
Abdelwahed A., Mahmoud A., Bdair R., Information Security Policies and their Relationship with the Effectiveness of the Management Information Systems of Major Palestinian Universities in the Gaza Strip, Int. J. Inf. Sci. Manag, 15, 1, (2017)
[5]  
Hina S., Dominic P. D. D., Information Security Policies: Investigation of Compliance in Universities, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS), (2016)
[6]  
Faris S., Hasnaoui S. E., Medromi H., Iguer H., Sayouti A., Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002, Iso 27005, Int. J. Adv. Comput. Sci. Appl, 5, 6, (2014)
[7]  
Eze T. A., Aroh C. C.-E., Management of Information Security in Public Universities in Nigeria, Int. J. Digit. Soc, 11, 1, pp. 1575-1578, (2020)
[8]  
Piscikiene I., Romeikiene J., Sustickiene B., Cyber Vulnerability in Light of Online Learning Reality, Soc. Integr. Educ. Proc. Int. Sci. Conf, 5, pp. 426-435, (2021)
[9]  
Chandarman Rajesh, Van Niekerk Brett, Students’ Cybersecurity Awareness at a Private Tertiary Educational Institution, Afr. J. Inf. Commun. AJIC, 20, (2017)
[10]  
Badamasi B., Utulu S. C. A., Framework for Managing Cybercrime Risks in Nigerian Universities, Proceedings of the 1st Virtual Conference on Implications of Information and Digital Technologies for Development, (2021)