Cybersecurity leadership for institutions of higher education
Dissertation Chair, Capitol Technology University, 11301 Springfield Rd, Laurel, MD, USA.
Review Article
Global Journal of Engineering and Technology Advances, 2024, 20(01), 160–170.
Article DOI: 10.30574/gjeta.2024.20.1.0122
Publication history:
Received on 02 June 2024; revised on 12 July 2024; accepted on 15 July 2024
Abstract:
Research continues reporting an increase of cyber-attacks deployed against institutions of higher education. Unauthorized access to known vulnerabilities in software applications, institutions of higher education rely on, is providing external attackers ease of entrance points to access personal information assets. Information assets obtained enable external attackers to sell this information on the Dark Web, where anyone can purchase American Express, Visa, and Master Card details with CVV from the back of credit cards, as well as login and password information, expiration dates, mother’s maiden name, and so on. Thus, utilizing qualitative grounded theory lite research enables the researcher’s research study to be valid and significant. The researcher seeks to answer the question regarding why ineffective cybersecurity leadership advocates an attitude of tolerance for ineffective training and non-compliance. The researcher also desires to understand how to define improved cybersecurity and information security policy, institutions of higher education can rely on. As well as answer the question regarding what the best resolution is to decrease human error among executive leadership, administrators, faculty, and staff at institutions of higher education. After all, research proves human error is a leading cause of cyberattacks, particularly when institutions of higher education, information systems, technology, and/or cloud practitioners (ISTC) neglect to design effective training and technology usage policy. Thus, this research delivers a resolution supporting institutions of higher education need for increased cybersecurity leadership, delivered through an introduction, literature review, discussion, method of research, results, recommendations, and conclusion.
Keywords:
Cybersecurity leadership; Institutions of higher education cybersecurity; Thwarting cyber-attacks higher ed; Higher ed IT practitioners; Higher education cyber resilience; Cybersecurity for colleges and universities
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0