Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector

被引:4
作者
Piazza, Anna [1 ]
Vasudevan, Srinidhi [1 ]
Carr, Madeline [2 ,3 ]
机构
[1] Univ Greenwich, Sch Business Operat & Strategy, Old Royal Naval Coll Pk Row Greenwich, London SE10 9LS, England
[2] UCL, Dept Comp Sci, Gower St, London WC1E 6BT, England
[3] Gower St, London WC1E 6BT, England
来源
JOURNAL OF CYBERSECURITY | 2023年 / 9卷 / 01期
关键词
cybersecurity; higher education; university; social network analysis; collaboration; threat intelligence sharing; CHALLENGES;
D O I
10.1093/cybsec/tyad019
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Higher education has recently been identified as a sector of concern by the UK National Cyber Security Centre (NCSC). In 2021, the NCSC reported that universities and higher education institutions (HEI) had been exponentially targeted by cyber-criminals. Existing challenges were amplified or highlighted over the course of the global pandemic when universities struggled to continue to function through hybrid and remote teaching provision that relied heavily on their digital estate and services. Despite the value of the sector and the vulnerabilities within it, higher education has received relatively little attention from the cybersecurity research community. Over 2 years, we carried out numerous interventions and engagements with the UK higher education sector. Through interviews with cybersecurity practitioners working in the sector as well as roundtables, and questionnaires, we conducted a qualitative and quantitative analysis of threat intelligence sharing, which we use as a proxy for measuring and analysing collaboration. In a unique approach to studying collaboration in cybersecurity, we utilized social network analysis. This paper presents the study and our findings about the state of cybersecurity in UK universities. It also presents some recommendations for future steps that we argue will be necessary to equip the higher education sector to continue to support UK national interests going forward. Key findings include the positive inclination of those working in university cybersecurity to collaborate as well as the factors that impede that collaboration. These include management and insurance constraints, concerns about individual and institutional reputational damage, a lack of trusted relationships, and the lack of effective mechanisms or channels for sectoral collaboration. In terms of the network itself, we found that it is highly fragmented with a very small number of the possible connections active, none of the organizations we might expect to facilitate collaboration in the network are playing a significant role, and some universities are currently acting as key information bridges. For these reasons, any changes that might be led by sectoral bodies such as Jisc, UCISA or government bodies such as NCSC, would need to go through these information brokers.
引用
收藏
页数:15
相关论文
共 44 条
[1]  
Bachmann R., 2008, HDB INTERORGANIZATIO
[2]  
Borgatti SP., 2018, Analyzing Social Networks, DOI DOI 10.1080/0022250X.2015.1053371
[3]   A graph-theoretic perspective on centrality [J].
Borgatti, Stephen P. ;
Everett, Martin G. .
SOCIAL NETWORKS, 2006, 28 (04) :466-484
[4]  
Braun V., 2006, QUAL RES PSYCHOL, V3, P77, DOI [10.1191/1478088706qp063oa, DOI 10.1080/14780887.2020.1769238, DOI 10.1191/1478088706QP063OA]
[5]  
Chapman J., 2019, SAFE IS YOUR DATA CY
[6]  
CPNI, 2022, ABOUT US
[7]  
David D., 2020, Computers in Human Behavior, V106, P106
[8]  
Deloitte, 2021, POT PARTN HIGH ED CH
[9]   The iron cage revisited - Institutional isomorphism and collective rationality in organizational fields (Reprinted from the American Sociological Association vol 48, pg 147-160, 1983) [J].
DiMaggio, PJ ;
Powell, WW .
ADVANCES IN STRATEGIC MANAGEMENT, VOL 17, 2000: ECONOMICS MEETS SOCIOLOGY IN STRATEGIC MANAGEMENT, 2000, 17 :143-166
[10]  
Drabek T.E., 2003, Disaster Prevention and Management, V12, P97, DOI DOI 10.1108/09653560310474214