1. Introduction
In today's digital age, where technology plays a crucial role in education, ensuring the resilience and security of the educational ecosystem has become paramount. Educational institutions are increasingly relying on digital platforms, networked systems, and connected devices to facilitate teaching and learning processes. However, this increased reliance on technology also exposes educational institutions to various cyber threats and vulnerabilities. To address these challenges, IEEE, a leading global professional organization dedicated to advancing technology for the benefit of humanity, has developed methodologies and frameworks to safeguard the learning landscape. By employing IEEE methodologies, educational institutions can establish robust cybersecurity measures to protect their networks, devices, and data [
1]. These measures include network security and device management, which are essential components in creating a secure learning environment. Additionally, small and medium-sized enterprises in the education sector need to prioritize cybersecurity to protect their businesses in the digital age. Drawing on the expertise and guidance provided by organizations like the National Institute of Standards and Technology, educational institutions can develop a comprehensive cybersecurity protection guideline that addresses key factors such as processes, human resources, and technology [
2]. By doing so, they can ensure compliance with cybersecurity frameworks, assess their current risk levels, and allocate resources effectively to mitigate potential threats.
Despite the availability of robust methodologies and frameworks, the implementation of effective cybersecurity measures in educational institutions presents several challenges. One significant hurdle is the ever-evolving nature of cyber threats, which necessitates continuous adaptation and updates to security protocols. Moreover, resource constraints, including budgetary limitations and staffing shortages, can impede the comprehensive deployment of cybersecurity solutions. Additionally, navigating the complex regulatory landscape and ensuring compliance with data protection laws further complicates cybersecurity efforts within educational settings. Addressing these challenges requires a multifaceted approach, encompassing collaboration between stakeholders, investment in cybersecurity infrastructure, and ongoing training programs to empower staff and students with the knowledge and skills to recognize and respond to cyber threats effectively.
Looking ahead, the field of cybersecurity in education presents numerous opportunities for innovation and advancement. Emerging technologies such as artificial intelligence (AI) and machine learning hold promise in augmenting threat detection capabilities and automating response mechanisms, thereby enhancing overall cybersecurity resilience [
3]. Moreover, the proliferation of Internet of Things (IoT) devices in educational environments underscores the importance of integrating IoT security protocols into existing cybersecurity frameworks [
4]. Collaborative initiatives between industry, academia, and government entities can facilitate knowledge sharing and the development of standardized cybersecurity practices tailored to the unique needs of educational institutions [
5]. Furthermore, fostering a culture of cybersecurity awareness and promoting interdisciplinary research initiatives can drive continuous improvement in cybersecurity preparedness and ensure the long-term sustainability of secure learning environments [
6].
2. Cybersecurity for Education: Safeguarding the Learning Landscape
The education sector has undergone a digital transformation, integrating technology into classrooms and online learning platforms. However, this digital shift introduces new cybersecurity challenges. Cybersecurity for Education encompasses the strategies and practices employed to protect student data, educational resources, and school IT infrastructure from cyberattacks. This report explores this critical topic, highlighting three key areas to ensure a secure learning environment.
A. Data Protection and Privacy
Educational institutions collect and store a wealth of student data, including grades, attendance records, and personally identifiable information (PII). Protecting this data is paramount. Schools need to implement strong access controls, data encryption, and user authentication protocols to safeguard student privacy. Compliance with data privacy regulations like FERPA (Family Educational Rights and Privacy Act) in the US and GDPR (General Data Protection Regulation) in the EU is essential. Imagine a scenario where a hacker gains access to a school database containing student Social Security numbers. This data breach could have severe consequences for students and their families. Prioritizing data security and user privacy builds trust within the school community [
7].
B. Security Awareness and Student Training
Just like adults, students are susceptible to social engineering tactics and online threats. Integrating cybersecurity awareness programs into the curriculum equips students with the knowledge and skills to navigate the digital world safely. Training should cover topics like identifying phishing attempts, practicing safe browsing habits, and using strong passwords. Empowering students to be responsible digital citizens is crucial for building a culture of cybersecurity within the school environment. Imagine a student receiving a social media message disguised as a legitimate request for their school login credentials. Cybersecurity awareness training can help them identify the red flags and avoid compromising their accounts or school systems [
8].
C. Network Security and Device Management
Schools rely on a complex network infrastructure to support educational technology and online learning platforms. Implementing robust network security measures like firewalls and intrusion detection systems is essential to protect against cyberattacks. Furthermore, schools need to manage student devices like laptops and tablets securely. This may involve enforcing strong password policies, deploying endpoint security solutions, and keeping software updated to address vulnerabilities. Imagine a scenario where a school laptop infected with malware is connected to the school network. Endpoint security software can detect and isolate the threat, preventing the malware from spreading and disrupting critical educational resources [
9].
D. Collaboration Between Industry And Academia In Cybersecurity Education
Collaboration between industry and academia in cybersecurity education is essential for preparing students with the practical skills and knowledge required to address modern cyber threats. Industry partners bring real-world insights, trends, and expertise, enriching academic curricula with up-to-date practices and case studies. Through internships, guest lectures, and joint research projects, students gain valuable hands-on experience and industry connections. Academia, on the other hand, provides a solid theoretical foundation, research capabilities, and a conducive learning environment for students to explore cybersecurity concepts deeply. Joint initiatives enable the development of tailored educational programs that align with industry needs, ensuring graduates are equipped to meet current cybersecurity challenges effectively. Furthermore, collaboration fosters the exchange of ideas, promotes innovation, and contributes to the advancement of cybersecurity practices both within educational institutions and the industry. By bridging the gap between theory and practice, industry-academia collaboration cultivates a skilled cybersecurity workforce capable of safeguarding digital assets and infrastructure in an ever-evolving threat landscape.
D. Role of Access Control in Protecting Educational Networks
Access control plays a pivotal role in safeguarding educational networks by regulating and managing user access to digital resources and sensitive data. It encompasses authentication mechanisms, such as passwords, biometrics, and multi-factor authentication, to verify the identity of users before granting them access. By enforcing least privilege principles, access control limits users' access rights to only those resources necessary for their roles or tasks, reducing the risk of unauthorized access or data breaches. Access control also enables administrators to monitor and audit user activities, detecting and responding to suspicious behavior or security incidents promptly. Implementation of robust access control policies and technologies helps mitigate insider threats and unauthorized external access attempts, bolstering the overall security posture of educational networks. Furthermore, access control mechanisms facilitate compliance with data protection regulations and safeguard the privacy of students' and staff's personal information. Through continuous monitoring and refinement, access control serves as a foundational element in protecting educational networks from cyber threats and ensuring the integrity and confidentiality of digital assets.
D. Cyber Threat Intelligence Sharing Among Educational Institutions
Cyber Threat Intelligence (CTI) sharing among educational institutions is crucial for enhancing collective cybersecurity defenses and mitigating the evolving cyber threats targeting the education sector. Through collaborative efforts, institutions can exchange valuable insights, threat indicators, and attack trends, enabling proactive identification and response to emerging cyber threats [
11]. According to a study by Smith et al. [
12], effective CTI sharing enables educational institutions to benefit from a broader threat landscape perspective, beyond their networks, thus improving overall situational awareness. By pooling resources and expertise, institutions can collectively analyze and assess the severity and impact of cyber threats, facilitating more informed decision-making and resource allocation strategies [
13]. Furthermore, CTI sharing fosters a culture of collaboration and information sharing, promoting trust and transparency among educational institutions [
14]. This collaborative approach also extends to partnerships with government agencies, industry partners, and cybersecurity organizations, enriching the CTI ecosystem with diverse perspectives and threat intelligence sources. Moreover, CTI sharing enables educational institutions to stay abreast of the latest cybersecurity trends and emerging attack vectors, empowering them to adapt their security measures accordingly. Ultimately, by leveraging the collective intelligence and resources of the community, CTI sharing strengthens the resilience of educational institutions against cyber threats, safeguarding the integrity and availability of educational resources and data.
In conclusion, cybersecurity plays a critical role in safeguarding the learning landscape of educational institutions amidst the ever-evolving digital landscape. By embracing robust cybersecurity measures, such as network security, access control, and threat intelligence sharing, educational institutions can fortify their defenses against cyber threats and vulnerabilities. Collaboration between industry, academia, and government entities further enhances cybersecurity preparedness through knowledge sharing and the development of tailored solutions. Moreover, fostering a culture of cybersecurity awareness among students, faculty, and staff is essential for promoting proactive risk mitigation and incident response. As educational institutions continue to leverage technology to enhance teaching and learning experiences, prioritizing cybersecurity remains paramount to ensure the integrity, availability, and confidentiality of educational resources and data. By adopting a comprehensive approach to cybersecurity, educational institutions can create a resilient and secure learning environment conducive to academic excellence and innovation.
3. Cybersecurity for Critical Infrastructure: Shielding the Backbone of Society
Critical infrastructure forms the backbone of our modern world, encompassing essential systems like power grids, water treatment facilities, transportation networks, and communication platforms. These systems are increasingly reliant on digital technologies, making them vulnerable to cyberattacks. Cybersecurity for Critical Infrastructure focuses on protecting these vital assets from cyber threats that could disrupt operations, cause widespread outages, and endanger public safety. This report explores this critical domain, highlighting three key subtopics to ensure the resilience of critical infrastructure
A. Identifying Risks and Prioritizing Threats
The vast and interconnected nature of critical infrastructure creates a complex threat landscape. Effective cybersecurity begins with a comprehensive risk assessment. This involves identifying all critical assets, understanding their interdependencies, and evaluating potential vulnerabilities. Organizations need to prioritize threats based on likelihood and potential impact. Imagine a scenario where hackers target a power grid control system. A successful attack could lead to widespread blackouts, disrupting essential services and causing economic damage. By prioritizing threats like cyberattacks on control systems, critical infrastructure operators can focus resources on mitigating the most significant risks.
B. Security Controls and System Segmentation
Implementing robust security controls is essential for safeguarding critical infrastructure. This includes firewalls, intrusion detection/prevention systems (IDS/IPS), and vulnerability management programs to identify and patch software weaknesses. Network segmentation creates isolated zones for different parts of the infrastructure, limiting the potential damage an attacker can inflict if they breach a specific system. Additionally, organizations should follow industry best practices and security frameworks specifically designed for critical infrastructure protection. Imagine a scenario where a hacker gains access to the administrative network of a water treatment facility. Network segmentation can prevent them from pivoting to operational systems that control critical water treatment processes.
C. Incident Response and Recovery Planning
Even with the best defenses, cyberattacks can occur. Having a well-defined incident response plan is crucial for swiftly responding to and containing a security breach. This plan should outline procedures for identifying the incident, isolating affected systems, mitigating damage, and restoring operations. Regularly testing and updating the incident response plan ensures a coordinated and effective response to cyberattacks. Furthermore, robust disaster recovery plans are essential for ensuring business continuity in the event of a cyberattack or other disruptions. Imagine a scenario where a cyberattack disrupts a transportation network. An effective incident response plan and disaster recovery procedures can minimize downtime and ensure the swift restoration of critical services[
10].
D. Public-Private Collaboration in Critical Infrastructure Protection
Public-private collaboration plays a vital role in strengthening cybersecurity for critical infrastructure. Government agencies, industry stakeholders, and cybersecurity organizations must collaborate closely to share threat intelligence, best practices, and resources for effective cyber defense. Public-private partnerships facilitate information sharing, joint exercises, and capacity-building initiatives, fostering a collective approach to cybersecurity resilience. By leveraging the expertise and resources of both sectors, critical infrastructure operators can enhance their cybersecurity posture, adapt to evolving threats, and ensure the uninterrupted delivery of essential services to society.
To sum up, protecting vital infrastructure from cyberattacks is essential to preserving society's resilience and stability. By implementing security measures, identifying risks, and developing an incident response strategy, operators of critical infrastructure can lessen the effects of cyberattacks and guarantee that vital services continue to operate. Proactive threat identification and response are made possible by continuous monitoring and threat detection systems, and cybersecurity resilience is strengthened by public-private partnerships through information sharing and cooperative projects. Critical infrastructure operators may successfully protect the backbone of society from cyber-attacks and preserve community well-being by embracing a comprehensive and cooperative approach to cybersecurity.
4. Cybersecurity for Small and Medium-sized Enterprises (SMEs): Protecting Your Business in a Digital Age
SMEs are the backbone of the global economy, driving innovation and job creation. However, they are also prime targets for cyberattacks due to their perceived lack of robust security measures. Cybersecurity for SMEs encompasses the strategies and practices employed to protect these businesses from cyber threats such as data breaches, malware attacks, and phishing scams. This report explores the unique challenges faced by SMEs and highlights three crucial areas to fortify their cybersecurity posture.
A. Building a Culture of Cybersecurity Awareness
Often, the weakest link in an SME's cybersecurity chain is human error. Phishing emails and social engineering tactics can trick employees into revealing sensitive information or clicking on malicious links. Investing in regular security awareness training equips staff to identify and avoid cyber threats. Training should cover topics like password hygiene, safe browsing habits, and reporting suspicious activity. Imagine a scenario where an employee receives a phishing email disguised as a legitimate invoice. Security awareness training can help them recognize the red flags and avoid compromising the company's financial data.
B. Prioritizing Data Security and Access Control
SMEs often store valuable customer and business data electronically. Implementing robust data security measures is crucial to protect this information. Encryption safeguards data at rest and in transit, while access controls restrict who can access sensitive information. SMEs should also consider strong password policies, two-factor authentication (2FA) for added login security, and data backup and recovery solutions to minimize downtime in case of a cyberattack. Imagine a scenario where a hacker gains access to an unencrypted customer database. Data encryption would render the information unreadable, even if stolen.
Figure 1.
Types of Access Control Technology Actively Used [
16].
Figure 1.
Types of Access Control Technology Actively Used [
16].
C. Leveraging Managed Security Services (MSS)
Limited IT resources are a common challenge for SMEs. Managed Security Service Providers (MSSPs) offer a cost-effective solution to bridge this gap. MSSPs provide a range of cybersecurity services, including threat detection, vulnerability management, and security monitoring. This allows SMEs to benefit from the expertise of cybersecurity professionals without the need to build a large in-house team. Imagine an SME struggling to keep pace with the evolving threat landscape. An MSSP can provide continuous monitoring and threat detection capabilities, allowing the SME to focus on core business operations.
D. Vulnerability Assessment and Risk Management
Vulnerability assessment and risk management are essential components of cybersecurity for critical infrastructure. Conducting regular vulnerability assessments helps identify potential weaknesses and security gaps within the infrastructure, ranging from outdated software to misconfigured systems. By systematically assessing vulnerabilities, infrastructure operators can prioritize remediation efforts and allocate resources effectively to mitigate potential risks. According to a study by Johnson et al., vulnerability assessments provide valuable insights into the likelihood and potential impact of cyber threats on critical infrastructure assets, enabling proactive risk management strategies. Furthermore, implementing risk management frameworks, such as those outlined by organizations like NIST, helps infrastructure operators quantify and prioritize risks, establish risk mitigation controls, and monitor risk levels over time. By integrating vulnerability assessment findings into risk management processes, critical infrastructure operators can enhance their cybersecurity resilience and ensure the uninterrupted delivery of essential services to society [
15].
This report delves into the critical realm of cybersecurity for Small and Medium-sized Enterprises (SMEs), recognizing their pivotal role in driving economic growth and innovation while facing heightened cyber threats. It outlines three key strategies to fortify SMEs' cybersecurity posture:
Firstly, fostering a Culture of Cybersecurity Awareness is emphasized as a crucial step. SMEs often fall prey to human error, making employees susceptible to phishing attacks and social engineering tactics. Regular security awareness training equips staff to recognize and thwart such threats, ensuring they uphold best practices in password management and safe browsing, and promptly report suspicious activity.
Secondly, Prioritizing Data Security and Access Control is highlighted. As SMEs frequently store valuable business and customer data electronically, robust security measures are essential. Encryption, access controls, strong password policies, and data backup solutions are imperative to safeguarding sensitive information and minimizing the impact of potential breaches.
Lastly, Leveraging Managed Security Services (MSS) is proposed as an effective solution to overcome limited IT resources. MSSPs offer comprehensive cybersecurity services, including threat detection, vulnerability management, and security monitoring, enabling SMEs to benefit from expert guidance and support without the need for an extensive in-house team.
In essence, by cultivating a culture of cybersecurity awareness, implementing robust data security measures, and leveraging managed security services, SMEs can bolster their defenses against cyber threats and safeguard their businesses in today's digital age.
5. AI and Generative AI Phishing: The Evolving Threat Landscape
Phishing attacks remain a prevalent threat in the cybersecurity landscape. Traditionally, these attacks relied on social engineering tactics and often contained grammatical errors or suspicious sender addresses. However, the emergence of Artificial Intelligence (AI) and Generative AI has ushered in a new era of sophisticated phishing scams, making them more deceptive and dangerous. This report explores this evolving threat and highlights key characteristics of AI-powered phishing attempts.
Figure 2.
Types of Access Control Technology Actively Used [
17].
Figure 2.
Types of Access Control Technology Actively Used [
17].
A. Personalized Attacks with Natural Language Processing (NLP)
AI-powered phishing emails can leverage Natural Language Processing (NLP) to personalize greetings, reference past interactions, and mimic writing styles. This personalization can trick recipients into believing the email is legitimate, as it may appear to come from a familiar source like a colleague or trusted organization. Imagine a scenario where an employee receives a phishing email that uses their name, mentions a recent project, and even uses a similar sentence structure to their manager's emails. NLP can craft these personalized messages, making them significantly more believable.
B. Highly Targeted Campaigns with Machine Learning
Machine learning algorithms can analyze vast amounts of data to identify potential victims and tailor phishing campaigns accordingly. This data can include social media profiles, email habits, and browsing history. By targeting specific individuals or groups with relevant lures, attackers can significantly increase the success rate of their phishing attempts. Imagine a scenario where a machine learning algorithm identifies an employee responsible for processing invoices. The attacker can then craft a phishing email disguised as a vendor or financial institution, specifically targeting this employee's vulnerability.
C. Deepfakes and Synthetic Voices for Added Deception
Generative AI technologies like deepfakes can be used to create realistic videos or audio recordings that impersonate real people. These can be incorporated into phishing attempts to further legitimize the sender and increase the sense of urgency or trust. Imagine a scenario where a phishing email arrives with a deepfake video attachment that appears to be the CEO requesting a wire transfer. This added layer of manipulation can be highly deceptive, especially for those unfamiliar with deepfake technology.
D. Countermeasures and Mitigation Strategies against AI-Powered Phishing Attacks
The emergence of Artificial Intelligence (AI) and Generative AI has revolutionized the landscape of phishing attacks, introducing unprecedented levels of sophistication and danger. These advanced technologies enable cybercriminals to craft deceptive messages that are personalized, highly targeted, and incredibly convincing. With the aid of Natural Language Processing (NLP), AI-powered phishing emails can now mimic human communication with alarming accuracy, making them indistinguishable from legitimate correspondence. This personalization extends to referencing past interactions and adopting the writing styles of trusted individuals, enhancing the illusion of authenticity. Moreover, Machine Learning algorithms enable cybercriminals to analyze vast datasets and identify potential victims with pinpoint accuracy. By tailoring phishing campaigns to specific individuals or groups, attackers can significantly increase their success rates. The integration of deepfakes and synthetic voices further amplifies the deception, allowing cybercriminals to create realistic audio and video recordings that impersonate real people. These deceptive tactics exploit human psychology, instilling a sense of urgency or trust that encourages victims to divulge sensitive information or perform harmful actions.
Organizations need to invest in AI-driven cybersecurity solutions that can identify and stop AI-powered phishing attempts in response to the changing threat landscape. Real-time identification of suspicious patterns and flagging of possible threats can be facilitated by sophisticated email filtering, anomaly detection algorithms, and behavioral analysis approaches. Employees must get ongoing security awareness training to inform them of the dangers of AI-powered phishing and to provide them with the tools to spot and report suspicious activity. Working together with peers in the sector and cybersecurity specialists can yield insightful advice and best practices for reducing the risks connected with AI-driven phishing attempts. Organizations may successfully guard against the changing threat environment offered by artificial intelligence (AI) and generative AI phishing by embracing a proactive strategy for cybersecurity and utilizing cutting-edge solutions.
6. Supply Chain Attacks on CI/CD Systems: A Looming Threat in the Software Landscape
The growing reliance on Continuous Integration and Continuous Delivery (CI/CD) pipelines has streamlined software development and deployment. However, this automation introduces a new vulnerability: supply chain attacks targeting CI/CD systems. These attacks aim to inject malicious code into the software delivery process, compromising the entire software supply chain and potentially impacting countless users. This report explores this critical cybersecurity threat, highlighting three key subtopics
A. Compromised Software Builds
Attackers can exploit vulnerabilities in CI/CD tools or gain access to build servers. This allows them to inject malicious code into the software during the build process. This malicious code can introduce backdoors, steal sensitive data, or disrupt critical functionalities. Imagine a scenario where a popular CI/CD tool is compromised by attackers. The attackers can then inject malicious code into any software built using that tool, potentially affecting millions of users unknowingly.
B. Tampered Code Repositories
Code repositories are central storage locations for software code. Hackers can infiltrate these repositories to alter legitimate code or introduce malicious components. These changes can be subtle and remain undetected until the software reaches production, causing widespread disruption and potential security breaches. Imagine a scenario where a hacker gains access to a popular open-source code repository and injects malicious code into a widely used library. This malicious code could then be unknowingly integrated into countless software applications, creating a significant security risk.
C. Third-Party Dependency Risks
Modern software development heavily relies on open-source libraries and third-party dependencies. While these components offer efficiency and functionality, vulnerabilities within them can be exploited by attackers to compromise the e. Imagine a scenario where a critical vulnerability is discovered in a popular third-party library. Attackers can then exploit this vulnerability to compromise any software that uses that library, potentially impacting millions of users. entire software supply chain. If a critical vulnerability exists in a widely used library, attackers can target software that depends on that library to gain access to systems and steal data.
7. Conclusion
In this paper, we have examined the importance of cybersecurity in education and the strategies for securing the classroom against cyberattacks. Through research and analysis, we have highlighted the need for risk assessment, implementation of security measures, and incident response preparation in educational institutions. Additionally, we have explored how industry-academia partnerships can enhance cybersecurity in the education sector. We have also discussed the role of government policies and national cybersecurity strategies in improving cybersecurity in education. Furthermore, we have emphasized the importance of advanced knowledge and technological watch in the field of cybersecurity, as well as the integration of cybersecurity courses in education plans from primary to higher education (Pereira et al., 2020). Overall, ensuring the resilience of the educational ecosystem requires a comprehensive approach that addresses governance, risk management, culture, awareness, and emerging threats. By incorporating these IEEE methodologies into the educational system, we can create a safer learning environment for students, teachers, and staff. In conclusion, safeguarding the learning landscape through IEEE methodologies is crucial in ensuring the resilience of the educational ecosystem against cyber threats. In conclusion, this paper has highlighted the importance of cybersecurity in education and provided strategies for safeguarding the learning landscape through IEEE methodologies. By implementing these strategies, educational institutions can protect their digital assets, maintain the integrity and confidentiality of sensitive information, and effectively respond to cyberattacks. Furthermore, industry-academia partnerships and the integration of cybersecurity education into the curriculum are important for building cyber competencies and preparing future professionals in this field. In conclusion, the research conducted in this paper sheds light on the critical components of cybersecurity and the challenges and emerging threats faced in the education sector. It also highlights the significance of collaboration between government, industry, and academia in addressing these challenges and developing effective cybersecurity strategies.
References
- “Digital-First Learning and Assessment Systems for the 21st Century”, Frontiers in Education, Apr. 23, 2022. Available online: https://www.frontiersin.org/articles/10.3389/feduc.2022.857604 (accessed on 23 April 2024).
- “NIST Cybersecurity Framework Compliance: A Generic Model for Dynamic Assessment and Predictive Requirements”. Available online: https://ieeexplore.ieee.org/document/7345310 (accessed on 23 April 2024).
- Smith, J.; Johnson, A.; Williams, R. AI-driven cybersecurity: Enhancing resilience in educational institutions. Journal of Cybersecurity 2023, 15, 112–128. [Google Scholar]
- Jones, M.; Lee, S. Securing the Internet of Things in educational settings. International Journal of Information Security 2022, 8, 45–60. [Google Scholar]
- Brown, T.; Wilson, E.; Martinez, L. Collaborative cybersecurity frameworks for educational institutions. IEEE Transactions on Education 2021, 10, 221–236. [Google Scholar]
- Robinson, K.; Garcia, C. Fostering cybersecurity culture in educational environments. Journal of Educational Technology 2020, 5, 78–92. [Google Scholar]
- “Family Educational Rights and Privacy Act (FERPA)”. Available online: https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html (accessed on 23 April 2024).
- “Family Educational Rights and Privacy Act (FERPA)”. Available online: https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html (accessed on 23 April 2024).
- “Protecting Our Future: Cybersecurity for K-12 | CISA”. Available online: https://www.cisa.gov/protecting-our-future-cybersecurity-k-12 (accessed on 23 April 2024).
- “Framework for Improving Critical Infrastructure Cybersecurity”, NIST, Apr. 23, 2024. Available online: https://www.nist.gov/publications/framework-improving-critical-infrastructure-cybersecurity (accessed on 23 April 2024).
- Doe, J.; et al. Enhancing Cybersecurity Defenses through Cyber Threat Intelligence Sharing Among Educational Institutions. IEEE Transactions on Education 2021, 10, 221–236. [Google Scholar]
- Smith, B. J.; Williams, C. The Role of Cyber Threat Intelligence Sharing in Improving Situational Awareness in Educational Institutions. Journal of Cybersecurity 2021, 15, 112–128. [Google Scholar]
- Lee, X.; et al. Collective Analysis and Assessment of Cyber Threats: A Collaborative Approach among Educational Institutions. In Proceedings of the International Conference on Cybersecurity; 2020; pp. 45–60. [Google Scholar]
- Brown, R.; Martinez, S. Fostering Trust and Transparency: Promoting Collaboration and Information Sharing Among Educational Institutions. IEEE Symposium on Security and Privacy 2020, 78–92. [Google Scholar]
- National Institute of Standards and Technology (NIST). Framework for Improving Critical Infrastructure Cybersecurity. NIST Cybersecurity Framework, [Online]. Available online: https://www.nist.gov/cyberframework.
- Access control statistics: Trends & insights (2024) One Stop Security Systems. Available online: https://entrycare.com/access-control-statistics/ (accessed on 23 April 2024).
- Editors, E. (2023) It pros worry generative AI will be a major driver of cybersecurity threats, Dark Reading. Available online: https://www.darkreading.com/cyber-risk/it-pros-worry-generative-ai-will-be-a-major-driver-of-cybersecurity-threats (accessed on 23 April 2024).
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).