The Defensive Cyber Security Readiness Model for Higher Education


Authors : William Kipkoech Too; Alex Kibet

Volume/Issue : Volume 10 - 2025, Issue 3 - March


Google Scholar : https://tinyurl.com/bdekthd3

Scribd : https://tinyurl.com/bddhbv6h

DOI : https://doi.org/10.38124/ijisrt/25mar1158

Google Scholar

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 15 to 20 days to display the article.


Abstract : Cybersecurity entails a variety of concepts, tools and practices that are closely related to those of security aligned to information and operational technology. Citizens worldwide now have easy access to the internet, broadband, and fiber connectivity due to recent technology adoption. Threats to general cyber security, such as financial fraud, social engineering schemes, and virus attacks, have grown. Despite the fact that numerous standards like NIST and ISO have came up with a number of security models, the majority of businesses and organizations, as well as the cyber-security industry itself, are ill-prepared for the growing number of cyberattacks. This is due to the fact that the majority of security analysis systems now in use are primarily concerned with attack detection. Because of this circumstance, the attack surface has been continuously expanding in institutions of higher learning where sensitive data and valuable assets are highly valued by staff and students. This study was to evaluate the defensive cyber security preparedness model for Universities. The study utilized a goal-based method to evaluate the model based on its functionality, usability, reliability, efficiency, and maintainability metrics. The evaluation results from the experts conducted indicate that the model is over 80% satisfactory. This study is very significant as universities will be able to ascertain their preparedness status as well responding to outlined recommendations that will ensure they stay safe from future evolving cyber threats.

Keywords : Fiber, Cybersecurity, Cyber-Attack, Preparedness, Metrics.

References :

  1. Beniwal, S. (2015). Ethical Hacking: A Security Technique. International Journal of Advanced Research in Computer Science and Software Engineering
  2. Biddle, S. (2017, December 13). Three of the Biggest Cybersecurity Challenges Facing the Education Sector. Retrieved March 28, 2019, from Fortinet Blog website: https:/ /www.fortinet.com/blog/business-and-technology/three-of-the-biggest-cybersecurity-challenges-facing-the-education-sector.html
  3. Cipher. (2017). 10 Cybersecurity Metrics You Should Be Monitoring. Retrieved April 4, 2019, from http://blog.cipher.com/10-cybersecurity-metrics-you-should-be-monitoring
  4. Cronholm, S., & Goldkuhl, G. (2003). Strategies for Information Systems Evaluation- Six Generic Types. Electronic Journal of Information Systems Evaluation, 6(2), 65–74.
  5. Francis, R. (2017, May 5). Third parties leave your network open to attacks. Retrieved June 11, 2019, from Network World website: https://www.networkworld.com/article/3194832 /third-parties-leave-your-network-open-to-attacks.html
  6. GTAG. (2016). Assessing cybersecurity risk. Retrieved from https://www.aicpa.org/content/ dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/cybersecurity/gtag-assessing-cybersecurity-risk.
  7. Kigen, P. M., Muchai, C., Kimani, K., Mwangi, M., Shiyayo, B., Ndegwa, D., ... & Shitanda, S. (2015). Kenya Cyber Security Report 2015. Serianu Limited.
  8. Levin, A. (2018, February 22). How Can 73 Percent of Companies Not Be Prepared for Hackers? Retrieved June 11, 2019, from Inc.com website: https://www.inc.com/adam-levin/more-than-70-percent-of-businesses-admit-theyre-unprepared-for-a-cyberattack.html
  9. Lippmann, R. P., & Riordan, J. F. (2016). Threat-Based Risk Assessment for Enterprise Networks.
  10. Lord, N. (2014, December 18). 101 Data Protection Tips: How to Keep Your Passwords,Financial & Personal Information Safe in 2019 [Text]. (2014, December 18). Retrieved June 11, 2019, from Digital Guardian website: https://digitalguardian.com /blog/101-data-protection-tips-how-keep-your-passwords-financial-personal-information-safe
  11. Lykou, G., Anagnostopoulou, A., & Gritzalis, D. (2018). Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls. Sensors, 19(1), 19. https://doi.org/10.3390/s19010019
  12. Messer, A., & Medairy, B. (2018). The Future of Cyber Defense... Going on the Offensive.
  13. Ministry of Education, (2016). University Education and Research.
  14. Ministry of ICT, (2014). National Cybersecurity Strategy
  15. Molck-Ude, P. (2019). A corporate network is part of a company’s IT strategy. Retrieved June 11, 2019, from https://www.t-systems.com/en/perspectives/networks/network-techniques/data-networks-375244
  16. Neaimi, A. Al, Ranginya, T., & Lutaaya, P. (2015). A Framework for Effectiveness of Cyber Security Defenses , a case of the United Arab Emirates ( UAE ). 4(1), 290–301.
  17. Poremba, S.M. (2017). Network Access Control: Controlling Access to Your Network and Data. Retrieved June 11, 2019, from https://www.esecurityplanet.com/network-security /network-access-control.html
  18. Preston, W. C. (2019). Protecting Corporate Data When an Employee Leaves. Retrieved June 11, 2019, from https://www.druva.com/blog/protecting-corporate-data-employee-leaves/.
  19. Ring, M., Landes, D., & Hotho, A. (2018). Detection of slow port scans in flow-based network traffic. PLOS ONE, 13(9), e0204507. https://doi.org/10.1371/journal.pone.0204507
  20. Shahmoradi, L., Changizi, V., Mehraeen, E., Bashiri, A., Jannat, B., & Hosseini, M. (2018). The challenges of E-learning system: Higher educational institutions perspective. Journal of Education and Health Promotion, 7. https://doi.org/10.4103/jehp.jehp_39_18
  21. Trull, J. (2017, August 3). Top 5 best practices to automate security operations. Retrieved June 3, 2019, from Microsoft Security website: https://www.microsoft.com/security/blog/2017 /08/03/top-5-best-practices-to-automate-security-operations/
  22. Update, T. P. (2017). Reimagining the Role of Technology in Education :, (January).
  23. Walsh, K. (2017, March 23). User Access Review Best Practices.. Retrieved June 11, 2019, from Reciprocity website: https://reciprocitylabs.com/user-access-review/.

Cybersecurity entails a variety of concepts, tools and practices that are closely related to those of security aligned to information and operational technology. Citizens worldwide now have easy access to the internet, broadband, and fiber connectivity due to recent technology adoption. Threats to general cyber security, such as financial fraud, social engineering schemes, and virus attacks, have grown. Despite the fact that numerous standards like NIST and ISO have came up with a number of security models, the majority of businesses and organizations, as well as the cyber-security industry itself, are ill-prepared for the growing number of cyberattacks. This is due to the fact that the majority of security analysis systems now in use are primarily concerned with attack detection. Because of this circumstance, the attack surface has been continuously expanding in institutions of higher learning where sensitive data and valuable assets are highly valued by staff and students. This study was to evaluate the defensive cyber security preparedness model for Universities. The study utilized a goal-based method to evaluate the model based on its functionality, usability, reliability, efficiency, and maintainability metrics. The evaluation results from the experts conducted indicate that the model is over 80% satisfactory. This study is very significant as universities will be able to ascertain their preparedness status as well responding to outlined recommendations that will ensure they stay safe from future evolving cyber threats.

Keywords : Fiber, Cybersecurity, Cyber-Attack, Preparedness, Metrics.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe