Authors :
William Kipkoech Too; Alex Kibet
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/bdekthd3
Scribd :
https://tinyurl.com/bddhbv6h
DOI :
https://doi.org/10.38124/ijisrt/25mar1158
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
Cybersecurity entails a variety of concepts, tools and practices that are closely related to those of security
aligned to information and operational technology. Citizens worldwide now have easy access to the internet, broadband,
and fiber connectivity due to recent technology adoption. Threats to general cyber security, such as financial fraud, social
engineering schemes, and virus attacks, have grown. Despite the fact that numerous standards like NIST and ISO have
came up with a number of security models, the majority of businesses and organizations, as well as the cyber-security
industry itself, are ill-prepared for the growing number of cyberattacks. This is due to the fact that the majority of security
analysis systems now in use are primarily concerned with attack detection. Because of this circumstance, the attack
surface has been continuously expanding in institutions of higher learning where sensitive data and valuable assets are
highly valued by staff and students. This study was to evaluate the defensive cyber security preparedness model for
Universities. The study utilized a goal-based method to evaluate the model based on its functionality, usability, reliability,
efficiency, and maintainability metrics. The evaluation results from the experts conducted indicate that the model is over
80% satisfactory. This study is very significant as universities will be able to ascertain their preparedness status as well
responding to outlined recommendations that will ensure they stay safe from future evolving cyber threats.
Keywords :
Fiber, Cybersecurity, Cyber-Attack, Preparedness, Metrics.
References :
- Beniwal, S. (2015). Ethical Hacking: A Security Technique. International Journal of Advanced Research in Computer Science and Software Engineering
- Biddle, S. (2017, December 13). Three of the Biggest Cybersecurity Challenges Facing the Education Sector. Retrieved March 28, 2019, from Fortinet Blog website: https:/ /www.fortinet.com/blog/business-and-technology/three-of-the-biggest-cybersecurity-challenges-facing-the-education-sector.html
- Cipher. (2017). 10 Cybersecurity Metrics You Should Be Monitoring. Retrieved April 4, 2019, from http://blog.cipher.com/10-cybersecurity-metrics-you-should-be-monitoring
- Cronholm, S., & Goldkuhl, G. (2003). Strategies for Information Systems Evaluation- Six Generic Types. Electronic Journal of Information Systems Evaluation, 6(2), 65–74.
- Francis, R. (2017, May 5). Third parties leave your network open to attacks. Retrieved June 11, 2019, from Network World website: https://www.networkworld.com/article/3194832 /third-parties-leave-your-network-open-to-attacks.html
- GTAG. (2016). Assessing cybersecurity risk. Retrieved from https://www.aicpa.org/content/ dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/cybersecurity/gtag-assessing-cybersecurity-risk.
- Kigen, P. M., Muchai, C., Kimani, K., Mwangi, M., Shiyayo, B., Ndegwa, D., ... & Shitanda, S. (2015). Kenya Cyber Security Report 2015. Serianu Limited.
- Levin, A. (2018, February 22). How Can 73 Percent of Companies Not Be Prepared for Hackers? Retrieved June 11, 2019, from Inc.com website: https://www.inc.com/adam-levin/more-than-70-percent-of-businesses-admit-theyre-unprepared-for-a-cyberattack.html
- Lippmann, R. P., & Riordan, J. F. (2016). Threat-Based Risk Assessment for Enterprise Networks.
- Lord, N. (2014, December 18). 101 Data Protection Tips: How to Keep Your Passwords,Financial & Personal Information Safe in 2019 [Text]. (2014, December 18). Retrieved June 11, 2019, from Digital Guardian website: https://digitalguardian.com /blog/101-data-protection-tips-how-keep-your-passwords-financial-personal-information-safe
- Lykou, G., Anagnostopoulou, A., & Gritzalis, D. (2018). Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls. Sensors, 19(1), 19. https://doi.org/10.3390/s19010019
- Messer, A., & Medairy, B. (2018). The Future of Cyber Defense... Going on the Offensive.
- Ministry of Education, (2016). University Education and Research.
- Ministry of ICT, (2014). National Cybersecurity Strategy
- Molck-Ude, P. (2019). A corporate network is part of a company’s IT strategy. Retrieved June 11, 2019, from https://www.t-systems.com/en/perspectives/networks/network-techniques/data-networks-375244
- Neaimi, A. Al, Ranginya, T., & Lutaaya, P. (2015). A Framework for Effectiveness of Cyber Security Defenses , a case of the United Arab Emirates ( UAE ). 4(1), 290–301.
- Poremba, S.M. (2017). Network Access Control: Controlling Access to Your Network and Data. Retrieved June 11, 2019, from https://www.esecurityplanet.com/network-security /network-access-control.html
- Preston, W. C. (2019). Protecting Corporate Data When an Employee Leaves. Retrieved June 11, 2019, from https://www.druva.com/blog/protecting-corporate-data-employee-leaves/.
- Ring, M., Landes, D., & Hotho, A. (2018). Detection of slow port scans in flow-based network traffic. PLOS ONE, 13(9), e0204507. https://doi.org/10.1371/journal.pone.0204507
- Shahmoradi, L., Changizi, V., Mehraeen, E., Bashiri, A., Jannat, B., & Hosseini, M. (2018). The challenges of E-learning system: Higher educational institutions perspective. Journal of Education and Health Promotion, 7. https://doi.org/10.4103/jehp.jehp_39_18
- Trull, J. (2017, August 3). Top 5 best practices to automate security operations. Retrieved June 3, 2019, from Microsoft Security website: https://www.microsoft.com/security/blog/2017 /08/03/top-5-best-practices-to-automate-security-operations/
- Update, T. P. (2017). Reimagining the Role of Technology in Education :, (January).
- Walsh, K. (2017, March 23). User Access Review Best Practices.. Retrieved June 11, 2019, from Reciprocity website: https://reciprocitylabs.com/user-access-review/.
Cybersecurity entails a variety of concepts, tools and practices that are closely related to those of security
aligned to information and operational technology. Citizens worldwide now have easy access to the internet, broadband,
and fiber connectivity due to recent technology adoption. Threats to general cyber security, such as financial fraud, social
engineering schemes, and virus attacks, have grown. Despite the fact that numerous standards like NIST and ISO have
came up with a number of security models, the majority of businesses and organizations, as well as the cyber-security
industry itself, are ill-prepared for the growing number of cyberattacks. This is due to the fact that the majority of security
analysis systems now in use are primarily concerned with attack detection. Because of this circumstance, the attack
surface has been continuously expanding in institutions of higher learning where sensitive data and valuable assets are
highly valued by staff and students. This study was to evaluate the defensive cyber security preparedness model for
Universities. The study utilized a goal-based method to evaluate the model based on its functionality, usability, reliability,
efficiency, and maintainability metrics. The evaluation results from the experts conducted indicate that the model is over
80% satisfactory. This study is very significant as universities will be able to ascertain their preparedness status as well
responding to outlined recommendations that will ensure they stay safe from future evolving cyber threats.
Keywords :
Fiber, Cybersecurity, Cyber-Attack, Preparedness, Metrics.