Cybersecurity and Data Breaches at Schools

Cybersecurity and Data Breaches at Schools

Libi Shen (University of Phoenix, USA), Irene Chen (University of Houston – Downtown, USA) and Anchi Su (University of California – Los Angeles, USA)
DOI: 10.4018/978-1-5225-1941-6.ch007
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Has anyone considered his/her family information going viral and through his/her trusted, chosen school district? This is an age where a mis-sent e-mail with student data can represent enormous liabilities, and a lost laptop can cause newspaper headlines. School institutes are facing new cyber security challenges in the Information Age. A number of school institutes were grappling with the loss of confidential information and protecting students on the Internet. How should school authorities react in case of data breach? What should they do to prevent data breaches at schools? What are upcoming trends in cybersecurity? The purpose of this chapter is to explore data breaches at K-12 schools as well as to examine the ways to improve cybersecurity. In this chapter, the researchers attempt to provide suggestions, solutions, and recommendations on cybersecurity after examining the problems of data breaches.
Chapter Preview
Top

Background

In Gray’s (2015) study, the top ten data breaches of 2014 at educational facilities were: University of Maryland College Park (309,079 records), North Dakota University (290,780 records), Butler University (163,000 records), Indiana University (146,000 records), Arkansas State University College of Education and Behavioral Science’s Department of Childhood Service (50,000 records), Riverside Community College (35,212 records), Iowan State University (29,780 records), Orangeburg-Calhoun Technical College (20,000 records), University of Wisconsin-Parkside (15,000 records), and Seattle Public Schools (8,000 records). It is obvious that both higher education institutes and public schools were involved. Cybersecurity becomes an important issue at schools due to data breaches. In the following, the researchers would like to review literature on the definitions of cybersecurity and data breach, the impact of data breaches, federal policies on cybersecurity, and ways to confront data breaches.

Complete Chapter List

Search this Book:
Reset