Open Access   Article Go Back

Review on Major Cyber security Issues in Educational Sector

Ankita Sharma1

Section:Review Paper, Product Type: Journal Paper
Volume-9 , Issue-12 , Page no. 26-29, Dec-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i12.2629

Online published on Dec 31, 2021

Copyright © Ankita Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ankita Sharma, “Review on Major Cyber security Issues in Educational Sector,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.12, pp.26-29, 2021.

MLA Style Citation: Ankita Sharma "Review on Major Cyber security Issues in Educational Sector." International Journal of Computer Sciences and Engineering 9.12 (2021): 26-29.

APA Style Citation: Ankita Sharma, (2021). Review on Major Cyber security Issues in Educational Sector. International Journal of Computer Sciences and Engineering, 9(12), 26-29.

BibTex Style Citation:
@article{Sharma_2021,
author = {Ankita Sharma},
title = {Review on Major Cyber security Issues in Educational Sector},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2021},
volume = {9},
Issue = {12},
month = {12},
year = {2021},
issn = {2347-2693},
pages = {26-29},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5423},
doi = {https://doi.org/10.26438/ijcse/v9i12.2629}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i12.2629}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5423
TI - Review on Major Cyber security Issues in Educational Sector
T2 - International Journal of Computer Sciences and Engineering
AU - Ankita Sharma
PY - 2021
DA - 2021/12/31
PB - IJCSE, Indore, INDIA
SP - 26-29
IS - 12
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
390 306 downloads 131 downloads
  
  
           

Abstract

The demand for information security in higher education will continue to grow. A lack of risk management has already resulted in catastrophic data breaches, and these incidents are expected to continue. Academics, students, and universities around the world have been subjected to a constant torrent of attacks. This study relies on a review of several educational surveys. As a result of this research, new lines of study will be opened up for higher education security. Various sources have been analysed in this report to provide an overview of cyber security challenges. We categorise our review mostly based on the research questions that we address. In order to gain a foothold in the educational community, it will be beneficial to both corporations and academics.

Key-Words / Index Term

Threats, Virtual learning Environment, Issues, E-Learning

References

[1] Bongiovanni, I. The least secure places in the universe? A systematic literature review on information security management in higher education. Comput. Secur. 86, 350–357, 2019.
[2]Report on Business-standard. Available on: https://www.business-standard.com/article/technology/indian-tops-global-cyber-attacks-on-education-sector-report-121081801000_1.html
[3] FireEye, Inc. Cyber tHreats to the Education Industry. White Paper, 2016. Library Catalog. Available online: www.fireeye.com (accessed on 28 January 2021).
[4] Adams A; Blanford," A. Security and Online Learning: To Protect and Prohibit. In Usability Evaluation Of Online Learning Programs"; IGI Global: Hershey, PA, USA, pp. 331–359, 2003.
[5] J. ChapmanHow Safe Is Your Data? Cyber-Security in Higher Education. HEPI Policy Note, April ISO/IEC 27002:2013 Information Technology–Security Techniques–Information Security Risk Management; Standard; InternationalOrganization for Standardization: Geneva, Switzerland, 2018.
[6] G.Wangen,C.Hallstensen ,E.Snekkenes "A framework for estimating information security risk assessment method completeness.Int. J. Inf. Secur. 2017.
[7] J. Chapman "How Safe Is Your Data? Cyber-Security in Higher Education". HEPI Policy Note, April 2019.
[8] M. Whitman, H. Mattord, "Threats to Information Protection-Industry and Academic Perspectives: An annotated bibliography". J.Cybersecur. Educ. Res. Pract. 2016.
[9] K.Beaudin," The Legal Implications of Storing Student Data: Preparing for and Responding to Data Breaches".New Dir. InstitutionalRes. 37–48, 2017.
[10] K.Beaudi"College and university data breaches: Regulating higher education cybersecurity under state and federal law". J. Coll.Univ. Law 41, 657–693, 2015.
[11] H.S. Hussain,R.Din,N.Z Khidzir, K.A.M Daud, S.Ahmad, " Risk and Threat via Online Social Network among Academia at Higher Education". J. Physics: Conf. Ser. 1018, 012008 , 2018.
[12] I. Ajie, "A Review of Trends and Issues of Cybersecurity in Academic Libraries". Libr. Philos. Pract1–20. Available online:https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=5803&context=libphilprac (accessed on 28 January 2021).
[13] A.Diaz, A.T Sherman,A. Joshi, "Phishing in an Academic Community: A Study of User Susceptibility and Behavior". arXiv: 1811.06078, 2018.
[14] T. Cuchta, B. Blackwood, T.R Devine, R.J Niichel , K.M. Daniels, C.H.Lutjens, S. Maibach, R. J Stephenson. "Human Risk Factors in Cybersecurity". In Proceedings of the 20th Annual SIG Conference on Information Technology Education, Tacoma, WA,USA, 3–5 October; pp. 87–92, 2019.
[15] M. Dadkhah, G. Borchardt, T. Maliszewski, ,"Fraud in Academic Publishing: Researchers Under Cyber-Attacks". Am. J. Med. 130, 27–30, 2017.
[16] D. Teixeira ,J.Silva, A.Alkhatib, Tsigaris, P. "Spam emails in academia: Issues and costs". Scientometrics 122, 1171–1181, 2020.
[17] G. Wangen, N. Hellesen, H.Torres, E. Brækken, "An empirical study of root-cause analysis in information security management ".In Proceedings of the SECURWARE-The Eleventh International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA), Rome, Italy, 10–14 September 2017.
[18] H. Kashiwazaki, "Personal Information Leak in a University, and Its Cleanup". In Proceedings of the 2018 ACM SIGUCCS Annual Conference; Association for Computing Machinery: New York, NY, USA,; pp. 43–50, 2018.
[19] A.Deepa E. C. Blessie,”Input Analysis for Accreditation Prediction in Higher Education Sector by Using Gradient Boosting Algorithm”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.3, pp.23- 27, 2018.
[20]A Survey on Impact of IoT Enabled E – Learning Services, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.178-183, 2018.