Abstract
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect targets for cyber attackers. University networks are open in design, decentralized and multi-user, making them vulnerable to cyber-attacks. The purpose of this research paper was to identify which is the recommended cyber security strategy and how comprehensive are these studies, within HEIs. The method proposed by Kitchenham was used, focused on the information community. Thus, the following results can be communicated: researchers recommend their own security strategies, because the standards analysed in the papers are not oriented on HEIs, and require important adjustments to be implemented. Most scientific papers do not describe risk management process. The implementation phases are also insufficiently analysed. The functions that the strategy addressed by HEIs should fulfill include identification, protection and detection. The validation methods used in the preimplementation and post-implementation phases are case studies and surveys. Most researchers recommend as final cyber security strategy IT Governance and security policies. The field of research has proved to be very interesting, the researches could contribute to the creation of a comprehensive cybersecurity strategy, focused on the specifics of HEIs, efficient, easy to implement and cost-effective.
Highlights
With the development of information technologies, their use in Higher Education Institutions (HEIs) has increased substantially
The main research question (MRQ) is:” What is the cyber security strategy recommended within HEIs, how comprehensive are these researches?”
This literature review was initiated to answer the main research question: " What is the cyber security strategy recommended within HEIs, how comprehensive are these researches?", in order to be able to build a security framework as comprehensive, efficient and cost-effective to increase cyber security under HEIs in the Republic of Moldova
Summary
With the development of information technologies, their use in HEIs has increased substantially. The main research question is: to identify the recommended security frameworks/strategies for HEIs, at international level, and how comprehensive are these studies, based on the review of the literature, published in the last 10 years. The research will focus on the analysis of the risk management and cyber security strategy, implementation phases, the functions of the security framework, validation methods and the finality of this process. To achieve this goal, the search was performed in the following five scientific databases: Scopus, ScienceDirect, ACM Digital Library, IEEE Xplore and Springer. By the proposed method, the systematic review process involves the following 3 important phases: planning, conducting and reporting the review
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have