Cybersecurity leadership for institutions of higher education

Bradley Fowler Orcid
{"title":"Cybersecurity leadership for institutions of higher education","authors":"Bradley Fowler Orcid","doi":"10.30574/gjeta.2024.20.1.0122","DOIUrl":null,"url":null,"abstract":"Research continues reporting an increase of cyber-attacks deployed against institutions of higher education. Unauthorized access to known vulnerabilities in software applications, institutions of higher education rely on, is providing external attackers ease of entrance points to access personal information assets. Information assets obtained enable external attackers to sell this information on the Dark Web, where anyone can purchase American Express, Visa, and Master Card details with CVV from the back of credit cards, as well as login and password information, expiration dates, mother’s maiden name, and so on. Thus, utilizing qualitative grounded theory lite research enables the researcher’s research study to be valid and significant. The researcher seeks to answer the question regarding why ineffective cybersecurity leadership advocates an attitude of tolerance for ineffective training and non-compliance. The researcher also desires to understand how to define improved cybersecurity and information security policy, institutions of higher education can rely on. As well as answer the question regarding what the best resolution is to decrease human error among executive leadership, administrators, faculty, and staff at institutions of higher education. After all, research proves human error is a leading cause of cyberattacks, particularly when institutions of higher education, information systems, technology, and/or cloud practitioners (ISTC) neglect to design effective training and technology usage policy. Thus, this research delivers a resolution supporting institutions of higher education need for increased cybersecurity leadership, delivered through an introduction, literature review, discussion, method of research, results, recommendations, and conclusion.","PeriodicalId":402125,"journal":{"name":"Global Journal of Engineering and Technology Advances","volume":"6 24","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Journal of Engineering and Technology Advances","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30574/gjeta.2024.20.1.0122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Research continues reporting an increase of cyber-attacks deployed against institutions of higher education. Unauthorized access to known vulnerabilities in software applications, institutions of higher education rely on, is providing external attackers ease of entrance points to access personal information assets. Information assets obtained enable external attackers to sell this information on the Dark Web, where anyone can purchase American Express, Visa, and Master Card details with CVV from the back of credit cards, as well as login and password information, expiration dates, mother’s maiden name, and so on. Thus, utilizing qualitative grounded theory lite research enables the researcher’s research study to be valid and significant. The researcher seeks to answer the question regarding why ineffective cybersecurity leadership advocates an attitude of tolerance for ineffective training and non-compliance. The researcher also desires to understand how to define improved cybersecurity and information security policy, institutions of higher education can rely on. As well as answer the question regarding what the best resolution is to decrease human error among executive leadership, administrators, faculty, and staff at institutions of higher education. After all, research proves human error is a leading cause of cyberattacks, particularly when institutions of higher education, information systems, technology, and/or cloud practitioners (ISTC) neglect to design effective training and technology usage policy. Thus, this research delivers a resolution supporting institutions of higher education need for increased cybersecurity leadership, delivered through an introduction, literature review, discussion, method of research, results, recommendations, and conclusion.
高等教育机构的网络安全领导力
研究报告显示,针对高等教育机构的网络攻击不断增加。未经授权访问高等教育机构所依赖的软件应用程序中的已知漏洞,为外部攻击者提供了访问个人信息资产的便捷入口。获取的信息资产使外部攻击者能够在暗网上出售这些信息,任何人都可以在暗网上购买美国运通卡、维萨卡和万事达卡的详细信息,包括信用卡背面的 CVV,以及登录名和密码信息、有效期、母亲的娘家姓等。因此,利用 "轻型定性基础理论研究 "可以使研究者的研究具有有效性和意义。研究人员试图回答为什么无效的网络安全领导会对无效培训和违规行为持容忍态度。研究人员还希望了解如何定义高等教育机构可以依赖的改进网络安全和信息安全政策。以及回答有关减少高等院校行政领导、管理人员、教职员工人为错误的最佳解决方案是什么的问题。毕竟,研究证明,人为错误是网络攻击的主要原因,尤其是当高等教育机构、信息系统、技术和/或云从业人员(ISTC)忽视设计有效的培训和技术使用政策时。因此,本研究通过引言、文献综述、讨论、研究方法、结果、建议和结论,提出了支持高等院校提高网络安全领导力的决议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信