Cyber Security Challenges on Academic Institutions and Need For Security Framework Towards Institutional Sustainability Growth And Development

Wali Mohammad Dar*
Department of Computer Science, School of Technology, Islamic University of Science and Technology Awantipora (IUST), Pulwama, Jammu and Kashmir, India
Periodicity:December - February'2016
DOI : https://doi.org/10.26634/jit.5.1.4795

Abstract

The growing dependence on computer networks and internet based applications in all areas of human involvement (Health, Education, Transportation and energy) makes it a big challenge to treat Cyber security as a separate dimension. For the sustainable development and existence of Academic Institutions, a secure and comprehensive framework is the need of the hour to ensure the sustainability and existence in the digital world. Cyber security consists of 'cyber space' which is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, organization and user's assets. Cyber security endeavors to ensure the attainment and maintenance of the security properties of the organization and user's assets. Therefore strong initiatives like implementation of security policies and strategic framework of procedures/plans to secure the future of Institutions are enforced. In the present era, digital information is at the core of almost all of a university activities and the safety and security of this information is vital for growth and development. This paper discusses the Security Framework as a means to protect information and technology resources, throughout the University.

Keywords

Comprehensive Framework, Digital Information, Computer Networks, Academic Institutions.

How to Cite this Article?

Dar. W. M (2016). Cyber Security Challenges on Academic Institutions and Need For Security Framework Towards Institutional Sustainability Growth And Development. i-manager’s Journal on Information Technology, 5(1), 1-6. https://doi.org/10.26634/jit.5.1.4795

References

[1]. Dar W.M (2015), “Advances in Computational Research” , Vol. 7, No. 1, pp. 159-163.
[2]. Dar W.M. (2014). International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, No. 7, pp. 756-763.
[3]. Innovation and Skills (2013). “Department for Business, Information security breaches survey”. Technical Report, PwC, UK.
[4]. Sipior J.C. and Ward B.T. (2008). Issues in Informing Science and Information Technology, Vol. 5, pp. 51-60.
[5] Siponen M. and Willison R. (2009). Information and Management, Vol. 46, No. 5, pp. 267-270.
[6]. Alfantookh A. (2009). “An Approach for the Assessment of The Application of ISO 27001 Essential Information Security Controls”. Computer Sciences, King Saud University.
[7]. Potter C. and Beard A. (2010). “Information security breaches survey 2010”, Price Water House Coopers, Earl's Court, London.
[8]. Barker W.C. (2003). “Guide for mapping types of information and information systems to security categories”, Network Security.
[9]. Wilson C. (2014). “Cyber threats to critical information infrastructure”. In Cyber terrorism, Springer New York, 123- 136.
[10]. Friedman A. and Singer P. (2014). Cyber security and Cyber war: what everyone needs to know.
[11]. Tripathi S.P., Goyal R., Shukla P.K. (2014). Introduction to information security and cyber laws, KLSI
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.