ICT Security Tools and Techniques among Higher Education Institutions: A Critical Review

被引:0
作者
Nuñez M. [1 ,2 ]
Palmer X.-L. [3 ]
Potter L. [3 ]
Aliac C.J. [4 ]
Velasco L.C. [1 ,5 ]
机构
[1] Mindanao State University Iligan Institute of Technology, Iligan City
[2] CyTech USA LLC, Denver, CO
[3] Old Dominion University, Norfolk, VA
[4] Cebu Institute of Technology University, Cebu City
[5] Premiere Research Institute of Science and Mathematics Center for Computational Analytics and Modelling, Iligan City
关键词
cybersecurity; higher education institutions; information security; IT governance;
D O I
10.3991/ijet.v18i15.40673
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories with specific ways to protect ICT security. HEIs also implement general security standards and guidelines, such as the ISO 27000-series and Center for Internet Security (CIS) controls, in their framework. Through synthesis and analysis of ICT security tools and techniques among HEIs, this critical review hopes to provide research directions on IT governance that academic and technical administrators can further explore to secure their information resources. © 2023 by the authors of this article. Published under CC-BY.
引用
收藏
页码:4 / 22
页数:18
相关论文
共 50 条
[31]  
Shonola S. A., Joy M. S., Shonola S. A., Joy M. S., Learners’ Perception on Security Issues in M-learning (Nigerian Universities Case Study), Exch. Interdiscip. Res. J, 2, 1, pp. 102-122, (2014)
[32]  
Shonola S. A., Joy M., Mobile Learning Security Issues from Lecturers’ Perspectives (Nigerian Universities Case Study), International Conference on Education and New Learning Technologies (EDULEARN14), (2014)
[33]  
Alotaibi S. S., Elnaim B. M. E., Risks Faces the Universities of Kingdom of Saudi Arabia in Mobile Learning, Int. J. Innov, 14, 7, (2020)
[34]  
Harrell C. R., Patton M., Chen H., Samtani S., Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions, 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 148-153, (2018)
[35]  
Huang Z., An Analysis of Information Security and Protection Strategies in Colleges and Universities in the Environment of Smart Campuses, J. Phys. Conf. Ser, 1852, 4, (2021)
[36]  
Gunawan W., Measuring Information Security and Cybersecurity on Private Cloud Computing, Journal of Theoretical and Applied Information Technology, 97, 1, (2019)
[37]  
Xu Y., Research on Computer Network Security Architecture of Universities in China, Adv. Mater. Res, 765-767, pp. 1486-1489, (2013)
[38]  
Joshi C., Singh U. K., Information Security Risks Management Framework—A Step Towards Mitigating Security Risks in University Network, J. Inf. Secur. Appl, 35, pp. 128-137, (2017)
[39]  
Zhao Y., Applied-Information Technology in the Internet of Things in the Construction of File Security System in Colleges and Universities, Adv. Mater. Res, 1014, pp. 399-403, (2014)
[40]  
Ghazvini A., Shukur Z., Hood Z., Review of Information Security Policy based on Content Coverage and Online Presentation in Higher Education, Int. J. Adv. Comput. Sci. Appl, 9, 8, (2018)