{"title":"Cybersecurity leadership for institutions of higher education","authors":"Bradley Fowler Orcid","doi":"10.30574/gjeta.2024.20.1.0122","DOIUrl":null,"url":null,"abstract":"Research continues reporting an increase of cyber-attacks deployed against institutions of higher education. Unauthorized access to known vulnerabilities in software applications, institutions of higher education rely on, is providing external attackers ease of entrance points to access personal information assets. Information assets obtained enable external attackers to sell this information on the Dark Web, where anyone can purchase American Express, Visa, and Master Card details with CVV from the back of credit cards, as well as login and password information, expiration dates, mother’s maiden name, and so on. Thus, utilizing qualitative grounded theory lite research enables the researcher’s research study to be valid and significant. The researcher seeks to answer the question regarding why ineffective cybersecurity leadership advocates an attitude of tolerance for ineffective training and non-compliance. The researcher also desires to understand how to define improved cybersecurity and information security policy, institutions of higher education can rely on. As well as answer the question regarding what the best resolution is to decrease human error among executive leadership, administrators, faculty, and staff at institutions of higher education. After all, research proves human error is a leading cause of cyberattacks, particularly when institutions of higher education, information systems, technology, and/or cloud practitioners (ISTC) neglect to design effective training and technology usage policy. Thus, this research delivers a resolution supporting institutions of higher education need for increased cybersecurity leadership, delivered through an introduction, literature review, discussion, method of research, results, recommendations, and conclusion.","PeriodicalId":402125,"journal":{"name":"Global Journal of Engineering and Technology Advances","volume":"6 24","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Journal of Engineering and Technology Advances","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30574/gjeta.2024.20.1.0122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Research continues reporting an increase of cyber-attacks deployed against institutions of higher education. Unauthorized access to known vulnerabilities in software applications, institutions of higher education rely on, is providing external attackers ease of entrance points to access personal information assets. Information assets obtained enable external attackers to sell this information on the Dark Web, where anyone can purchase American Express, Visa, and Master Card details with CVV from the back of credit cards, as well as login and password information, expiration dates, mother’s maiden name, and so on. Thus, utilizing qualitative grounded theory lite research enables the researcher’s research study to be valid and significant. The researcher seeks to answer the question regarding why ineffective cybersecurity leadership advocates an attitude of tolerance for ineffective training and non-compliance. The researcher also desires to understand how to define improved cybersecurity and information security policy, institutions of higher education can rely on. As well as answer the question regarding what the best resolution is to decrease human error among executive leadership, administrators, faculty, and staff at institutions of higher education. After all, research proves human error is a leading cause of cyberattacks, particularly when institutions of higher education, information systems, technology, and/or cloud practitioners (ISTC) neglect to design effective training and technology usage policy. Thus, this research delivers a resolution supporting institutions of higher education need for increased cybersecurity leadership, delivered through an introduction, literature review, discussion, method of research, results, recommendations, and conclusion.