A Human-Centric Cybersecurity Framework for Ensuring Cybersecurity Readiness in Universities

A Human-Centric Cybersecurity Framework for Ensuring Cybersecurity Readiness in Universities

Copyright: © 2023 |Pages: 35
DOI: 10.4018/978-1-6684-9018-1.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The escalating number of cyberattacks on universities worldwide resulted in universities losing valuable information assets leading to disruption of operations and loss of reputation. The research sought to explore a framework for human-factor vulnerabilities related to cybersecurity knowledge and skills, which enabled cybercriminals to manipulate human elements into inadvertently conveying access to critical information assets through social engineering attacks. Descriptive and inferential statistics were used to test the data, and Pearson's correlation statistics were used to measure the statistical relationships and association of variables. The results revealed that students and staff are vulnerable to social engineering attacks and their ability to protect themselves and other information assets is limited mainly due to poor cybersecurity knowledge and skills resulting from poor cybersecurity awareness and education.
Chapter Preview
Top

Background To The Study

In Zimbabwe, the Cyber-Security and Data Protection Act [Chapter 11:22] draft specifies in Clause 5 that the Postal and Telecommunications Regulatory Authority of Zimbabwe (POTRAZ) is designated as the Cyber Security Centre in Zimbabwe (Channon, 2019) and one of several functions of the Cyber Security Centre which this study is focusing on is providing guidelines to public and private sector interested parties on matters relating to awareness, training, enhancement, investigation, prosecution and combating cybercrime, and managing cyber security threats.

As a result, there is a demand for well-trained cybersecurity workers, and these specialists are developed in universities. Universities must invest in establishing cyber security expertise, which may be assessed by the number of initiatives, training and certification programs, and certified professionals of teams. This is also necessary to close the education-to-workforce gaps that are hindering efforts to fill cybersecurity jobs with qualified workers. These include gaps in competency, professional experience, and education speed-to-market (Milller & Molina-Ray, 2014).

Complete Chapter List

Search this Book:
Reset