Abstract

As universities migrate online due to the advent of Covid-19, there is a need for enhanced security in information systems in the institution of higher learning. Many opted to invest in technological approaches to mitigate cybersecurity threats; however, the most common types of cybersecurity breaches happen due to the human factor, well known as end-user error or actions. Thus, this study aimed to identify and explore possible end-user errors in academia and the resulting vulnerabilities and threats that could affect the integrity of the university's information system. The study further presented state-of-the-art humanoriented security threats countermeasures to compliment universities' cybersecurity plans. Countermeasures include well-tailored ICT policies, incident response procedures, and education to protect themselves from security events (disruption, distortion, and exploitation). Adopted is a mixedmethod research approach with a qualitative research design to guide the study. An open-ended questionnaire and semi-structured interviews were used as data collection tools. Findings showed that system end-user errors remain the biggest security threat to information systems security in institutions of higher learning. Indeed errors make information systems vulnerable to certain cybersecurity attacks and, when exploited, put legitimate users, institutional network, and its computers at risk of contracting viruses, worms, Trojan, and expose it to spam, phishing, e-mail fraud, and other modern security attacks such as DDoS, session hijacking, replay attack and many more. Understanding that technology has failed to fully protect systems, specific recommendations are provided for the institution of higher education to consider improving employee actions and minimizing security incidents in their eLearning platforms, post Covid-19.

Highlights

  • The University of Namibia is one of the largest and leading national institutions of higher learning in Namibia

  • Taking a closer look at these findings, institutions that use secure communication network protocols such as IP Security, Secure Socket Layer (SSL), Transport Layer Security (TLS), HTTPS, Secure Shell (SSH) and guide employees to follow security procedures and policy tend to have secure hardware and software, not vulnerable to attacks compared to those organizations that lack technical and computer security [16]

  • The study aimed to identify human aspects that lead to cybersecurity threats within the institution of higher education and recommend human-centred countermeasures

Read more

Summary

Introduction

The University of Namibia is one of the largest and leading national institutions of higher learning in Namibia. In carrying out this mandate, to provide higher quality education, it embraces technology. The university uses digital means that led to the collection of data and information gathered from its stakeholders, be it staff members, students, or education partners. The amount of data and information collected therein is a very important resource to the university; safeguarding and protecting it against illegal access is crucial [1]. The university's information systems here refers to e-mail systems, integrated tertiary system (SelfHelp enabler), staff computers, and corporate network. The CIA Triad assures users that information is correct, timely, reliable, and free from modifications, destruction, unauthorized access, misuse, and disclosure [2], [3]

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.