Abstract

Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect targets for cyber attackers. University networks are open in design, decentralized and multi-user, making them vulnerable to cyber-attacks. The purpose of this research paper was to identify which is the recommended cyber security strategy and how comprehensive are these studies, within HEIs. The method proposed by Kitchenham was used, focused on the information community. Thus, the following results can be communicated: researchers recommend their own security strategies, because the standards analysed in the papers are not oriented on HEIs, and require important adjustments to be implemented. Most scientific papers do not describe risk management process. The implementation phases are also insufficiently analysed. The functions that the strategy addressed by HEIs should fulfill include identification, protection and detection. The validation methods used in the preimplementation and post-implementation phases are case studies and surveys. Most researchers recommend as final cyber security strategy IT Governance and security policies. The field of research has proved to be very interesting, the researches could contribute to the creation of a comprehensive cybersecurity strategy, focused on the specifics of HEIs, efficient, easy to implement and cost-effective.

Highlights

  • With the development of information technologies, their use in Higher Education Institutions (HEIs) has increased substantially

  • The main research question (MRQ) is:” What is the cyber security strategy recommended within HEIs, how comprehensive are these researches?”

  • This literature review was initiated to answer the main research question: " What is the cyber security strategy recommended within HEIs, how comprehensive are these researches?", in order to be able to build a security framework as comprehensive, efficient and cost-effective to increase cyber security under HEIs in the Republic of Moldova

Read more

Summary

Introduction

With the development of information technologies, their use in HEIs has increased substantially. The main research question is: to identify the recommended security frameworks/strategies for HEIs, at international level, and how comprehensive are these studies, based on the review of the literature, published in the last 10 years. The research will focus on the analysis of the risk management and cyber security strategy, implementation phases, the functions of the security framework, validation methods and the finality of this process. To achieve this goal, the search was performed in the following five scientific databases: Scopus, ScienceDirect, ACM Digital Library, IEEE Xplore and Springer. By the proposed method, the systematic review process involves the following 3 important phases: planning, conducting and reporting the review

Planning the systematic review
Conducting the literature review
Validation methods
Recommended framework/standard for security management
Recommended Risk Management framework
Recommended implementing phases
Recommended security framework functions
Answer to complementary research question CRQ3
Recommended operational architecture
Objective control Does not provide
Recommended validation methods
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call