logo

Applications of Cyber-Security in Higher Education

This paper provides an overview of research on AI applications in higher education and highlights the need for educators to understand how to make pedagogical use of AI on a broader scale.

28 Pages7698 Words11 Views
   

Added on  2022-08-20

Applications of Cyber-Security in Higher Education

This paper provides an overview of research on AI applications in higher education and highlights the need for educators to understand how to make pedagogical use of AI on a broader scale.

   Added on 2022-08-20

ShareRelated Documents
CYBERSECURITY 0
Cyber Security In
Education
Applications of Cyber-Security in Higher Education_1
CYBERSECURITY 1
Abstract
Cyber-security is a part of information security that focuses on privacy
concerns and threats and provides a way to protect data against cyber-
attacks and risks. In this era, the rate of security attacks is growing day by
day due to which educational sectors are facing data breach-related
problems. Cyber-security plays a crucial character in education where it
helps to protect data from the criminals and resolve the issues effectively.
The significance of the investigation is to determine the concept of cyber-
security and the role of cyber-security tools in the area of higher education.
The adopted methodologies help to manage the flow of information and
resolved the research problems in a reliable manner. It is found that there
are major three issues faced by higher education including security issues,
unauthorized activities and fraud signals occurred in the systems. It is
significant to focus on privacy and resolve security concerns from
universities and cyber-security is the best approach that can be used in the
educational sectors. There are numerous applications of the cyber-security
in higher education including protecting personal data, enhancing
productivity and performance, solving data handling issues and many more.
Therefore, it is recommended that educational sectors should adopt cyber-
security tools and techniques for addressing security threats and issues and
protecting data against criminals.
Key Words: cyber-security, security risks, educational sectors, and
personal information
Applications of Cyber-Security in Higher Education_2
CYBERSECURITY 2
Table of Contents
Introduction................................................................................................................ 3
Cyber-security in education........................................................................................ 4
Method....................................................................................................................... 6
Search strategy....................................................................................................... 6
Screening and inter-rater reliability.........................................................................7
Coding, data extraction, and analysis.....................................................................8
Limitations............................................................................................................... 8
Results.................................................................................................................... 9
Methods................................................................................................................... 9
Understanding of cyber-security and critical reflection of risks and challenges.......10
Security challenges and attacks linked with cyber-security.....................................11
Malware................................................................................................................. 11
Phishing attack...................................................................................................... 12
Ransomware......................................................................................................... 12
Denial of service attack......................................................................................... 12
Areas covered by cyber-security in higher education...............................................13
Application security............................................................................................... 13
Information security.............................................................................................. 14
Disaster recovery.................................................................................................. 14
Network security................................................................................................... 14
Cybersecurity applications in higher education........................................................15
Protect business of higher education....................................................................15
Protects personal information............................................................................... 16
Allows members to work safely............................................................................. 16
Protects productivity............................................................................................. 17
Data integrity........................................................................................................ 17
Application and interface security.........................................................................18
Manage cyber-attacks and risks............................................................................18
Stops websites of universities from going down....................................................19
Conclusion and implications for further educational research..................................19
References............................................................................................................... 21
Applications of Cyber-Security in Higher Education_3
CYBERSECURITY 3
Applications of Cyber-Security in Higher Education_4
CYBERSECURITY 4
Introduction
Cybersecurity is defined as a body of practices and technologies which
are mainly developed for protecting computing networks, programs and
devices from the cyber-attacks and risk. It is a part of information
technology security that has the potential to control and address
unauthorized access from the systems and enhance the privacy of data in a
reliable manner (Abomhara, 2015). In the educational sector, cyber-security
plays a crucial character where it provides a way to handle security related
issues effectively and manage data breach problems. In this era, cyber-
security is significant as business communities and government gathers and
store an unprecedented amount of information on computing devices due to
which the hackers can easily attack on the databases and access private
details.
The aim of the research is to determine the concept behind cyber-
security and identify applications of cyber-security in the case of higher
education. Atat, et al., (2017) determined that cyber-security applications in
educational sectors are on the rise and have gathered a lot of attention in
recent years. In the year 2018, the rate of cybersecurity has increased by
45% and most of the business communities and educational sectors are
using information technologies and computing devices that require proper
security. Cyber-security provides a platform for managing security threats
and helps to enhance the privacy of sensitive data in educational sectors. In
this research there are different research questions will be addressed which
are highlighted below:
What is the concept behind cyber-security?
What is the significance of cyber-security in the educational sectors?
What are the security issues and attacks linked with higher
education?
Applications of Cyber-Security in Higher Education_5
CYBERSECURITY 5
What are the applications of cyber-security in the case of higher
education?
For addressing the above research questions, the recent papers will be
analyzed and appropriate research methods will be used for managing the
flow of information and achieving developed objectives. This paper will
include various sections, for example, cybersecurity in education, methods,
results, understanding of cyber-security and challenges linked with the
educational sector, cyber-security applications in higher education and
conclusion.
Cyber-security in education
Cyber-security is the practice of protecting networks and devices from
criminals and digital attacks. These attacks are mainly aimed at changing,
breaking privacy and accessing private data of the companies. In
educational sectors, management collects data from internet servers and
manages larger data sets using computing devices and networks. Most of
the attackers produce unwanted signals and transfer to the systems used by
the management for obtaining stored and recorded data of the users (Ben-
Asher, & Gonzalez, 2015). Cyber-security delivers a way where educational
sectors can identify the fraud and unwanted signals from the systems and
manage the privacy of data effectively.
Brown, Gommers, & Serrano, (2015) examined that cyber-security is
also called electronic information security which may be applied in a variety
of contexts from business to mobile computing. It is true that the utilization
of third party servers may produce unauthorized activities in the systems
that help criminals to affect the developed systems and obtain reliable data
of the students. Educational sectors collect and store huge amounts of
sensitive data including academic records, financial data, health records,
contact information and many more, which makes them lucrative targets for
criminals. The recent investigation identified that in the last few years
Applications of Cyber-Security in Higher Education_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber security Attacks | Assessment 1
|7
|1374
|30

Cyber Security Assignment 2022
|12
|2845
|22

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Cyber Security Assignment 2022
|13
|965
|14

Cyber Security Article 2022
|5
|1172
|24

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375