Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Cyber Security Threats to Educational Institutes: A Growing Concern for the New Era of Cybersecurity

Version 1 : Received: 5 November 2022 / Approved: 7 November 2022 / Online: 7 November 2022 (14:37:03 CET)

A peer-reviewed article of this Preprint also exists.

Jawaid, S. A. (2022). Cyber Security Threats to Educational Institutes: A Growing Concern for the New Era of Cybersecurity. Jawaid, S. A. (2022). Cyber Security Threats to Educational Institutes: A Growing Concern for the New Era of Cybersecurity.

Abstract

Background: The outbreak of the Covid-19 pandemic has significantly affected the operations of higher education institutions. Due to the limited use of video conferencing and cloud computing in these facilities, distance learning became the only option available to them. Objective: The study focused on identifying the most common types of attacks that can affect e-learning assets. Results: There was a lack of clear cybersecurity policies for educational institutes and universities in 2020, according to a report by Microsoft Security Intelligence. The report showed that the education industry was the most targeted sector for malware attacks in the last 30 days. Conclusion: The recommendations for improving the security of e-learning systems. Some of these include implementing policies that restrict access to the resources and applications, updating security patches, and using cryptographic protocols.

Keywords

Cyber security threats; Cyber security threats to educational institutes; growing concern for the new era of cybersecurity; New Era of cybersecurity

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.