External and Internal Cyber Security Threats Faced by Universities
Students or teenage people are comparatively more vulnerable to cyber security issues. However, the main reason for the same is that, they do not think before clicking on any random link, which might be malicious and eventually could harm their data. Besides that, in the case of adults, who have been familiar with such risks and are more aware, are comparatively more ready to face them, especially in terms of keeping their own data safe. Thus, such vulnerabilities as well as the valuable data which universities entail had eventually made the universities a target for cyber attackers. Hence, it should be a major question that, how could teenagers and teenage people be encouraged to take protective measures? Individual accountability is particularly important when communicating about the dangers of using the Web or when communicating regarding internet security (Boehmer, et al., 2015). The current study Protection Motivation Theory (PMT) is to investigate the influence of a previously unstudied component as well as the personal responsibility of the students of colleges and universities. However, as far as this particular paper is concerned, here will be discussed several aspects of cyber security issues regarding universities and colleges, along with discussing evaluation and responses previously prepared by prominent authors, as mentioned in the earlier bibliography (Boehmer, et al., 2015).
Regular Online consumers’ security protocols are still a popular issue since they are being asked to take steps to combat dangers, including resetting the password inside the aftermath of the WannaCry vulnerability panic in 2014 (Boehmer, et al., 2015). Moreover, it is also required to mention here that, such random or ordinary users of the internet are eventually the students of the colleges or universities. It happens because of the reason that they aren’t familiar with such attacks which eventually pull the ordinary users over random websites or web links that are malicious by nature. It is also evident with several examples regarding such cases that, their password gets in hands of the attackers or sometimes even the control of the entire system gets in the hands of attackers, all of which eventually leads to the cases where such ordinary users get their data deleted or leaked. Moreover, this paper will focus on such issues from studying or evaluating the information mentioned in the previously prepared papers, and eventually, a conclusion for the same would be prepared along with considering the responses of such papers (Boehmer, et al., 2015).
After going through all of the above-mentioned details regarding the cyber security in universities and the major reasons behind such fear of attack or the vulnerability of universities, it is needed to further talk about or gather the key features regarding the universities and the cyber security threats they have. To begin with such key features, it is needed to first talk about the issues or threats where the attackers are from the external sphere i.e., does not belong to the closed entity of the given university. Besides that, another threat that should be mentioned in the key features of cyber security regarding universities are the ones where it is required by the universities to think about the internal threats and be prepared to face them or eventually to fight with them. As nowadays using cloud storage for excessive data is very prominent out there, thus threats that are generally faced in the case of data stored over cloud services are also needed to be taken care of by the universities and thus should also be counted as a considerable key feature for this case. Besides that, it is also required to mention here that, although 90% of common perspective that secure Web activity are critical to the country’s financial stability, most participants stated that they do not participate inappropriate safety equipment habits. A quarter of personal computers visited the World wide web without antivirus software, putting the United States in 5th position from out 24 countries assessed. As a consequence, the overwhelming bulk (90 percent) didn’t feel secure when accessing the Web virus infections, spyware, and attackers. Which although Digitally Immigrants who’ve already grown up on social media are typically more laptop than preceding ages (Prensky 2001), the younger age poses a cybersecurity risk amongst individuals as well as the global rest of the society due to their risky web activities (Palfrey and Gasser 2008). In a polling average, teenagers in the United States between 18–29 had greater percentages of physically removing data or eliminating cookies using chrome browser, but then only 50% of them employed automatic computer data management. Teenagers were just more careful than elderly persons in preventing cyber dangers, but they were still significantly more prone to participate in inhabits that facilitate hacking attempts, including sharing images or birth certificates on social media. In a separate government study in the United States, roughly a third of participants aged 18–26 indicated they hadn’t ever updated their internet financial credentials or couldn’t recall the very last occasion they had accomplished so. Just a third of people upgraded their encryption programs and much less than 50% upgraded their version of windows or browsing technology on a constant schedule (Boehmer, et al., 2015).
Risks of Using Cloud Storage for Universities
In the same research, 86 percent of young people believed that a higher level of security educational interventions at college and workplace is necessary, acknowledging the importance of the identified consumers as the very first layer of defense versus dangers of the internet (Thompson 2005; Zhang 2005; Davinson and Silence 2010). Individuals and organizations, on the other hand, continue to jeopardize their website safety since security and protection solutions do not meet their demands and skills (Howe et al. 2012). As a result, Online shoppers must be converted into digital security defenders, a mission that has been dubbed the hardest obstacle in data protection (Rhee, Kim, and Ryu 2009). This effort should naturally include a lot of young people who are now in school and preparing to join the job market when they have the potential to adopt maintaining a proper that will last a career. As a result, the existing research asks, “How else can we persuade young person Website visitors to safeguard themselves through secure internet activity?”
The present investigation builds on the Conservation of Resources hypothesis (PMT; Rogers 1983), which also focuses on understanding people’s underlying motives to safeguard themself from dangers and has already been tried to apply to customer privacy as well as stability problems for over a century (LaRose, et al., 2005).
Researchers have investigated internet safety (Gurung, Luo, as well as Liao 2009), as well as access control behavior patterns, proceed to be interested in PMT. Individual accountability is a novel mediating factor proposed in this work, which contributes to this line of inquiry. This paper reports on two investigations that expand on the research of (LaRose, et al., 2005), but enhance or expand the information offered originally in various ways. The very first research examines the link between individual accountability with secure (i.e., protective) network industries in respect to typical PMT characteristics. This research includes a logistic strategy that predicts the impact of specific factors. The following research expanded on this by looking at a technique that helped including the randomized alteration of individual accountability. This research looks at a novel factor that can help us better comprehend internet security practices amongst university students as well as PMT. Furthermore, this research delves into how the results might be applied to practical internet security selecting and training tactics.
When confronted with danger, cognition evaluation mechanisms dictate the selection of behavioral indicators, according to PMT. A person will assess the threat’s frequency and consequence, and also his or her capacity to deal with that as well. Danger assessment is the method by which individuals evaluate two aspects of risk: the threat’s magnitude or prospective damage, with one’s sensitivity (or one’s assessment of the likelihood of the hazard event to him/herself). The practice of appraising two elements of buffering, one’s capacity to execute an important predictor (self-efficacy) and the behavior’s capacity and willingness to avoid the danger, is known as trying to cope evaluation (response efficacy). Hazard evaluations are a frequent approach amongst organizations that provide internet security data concerning vulnerability to cybersecurity risks (e.g., by highlighting that data transfer might lead to malware attacks) and their seriousness (e.g., by evoking the prospect of identity fraud). Attacks are regularly emphasized in mainstream press portrayals of internet safety concerns, which are sometimes followed by tough luck anecdotes and cautions it can occur to anybody.
Importance of Security Education Interventions for Teenage Students
Hazard appeals have been used to promote consciousness about digital security considerations, but now with inconsistent outcomes. Customized hazard signals boosted respondents’ intentions to act securely. The likelihood of taking precautionary countermeasures was directly related to the understanding of the consequences of malware. Several researchers have discovered a connection between the perceived danger as well as the implementation of defensive protection actions (such as downloading anti-virus programs) as well as the reduction of dangerous activities (e.g., saving passwords).
Rhee, Kim, as well as Ryu (2009), on either side, discovered that just mentioning the adverse implications of failing to respond to potential problems had only a minor effect on the deployment of safety precautions including such password authentication. Gurung, Luo, and Liao (2009) discovered a harsh impact but not a sensitivity impact. In PMT studies, warnings frequently failed to encourage appropriate behaviors or have only little impact. According to healthcare mass information, while intermediate degrees of danger stimulates appropriate behaviors, low concentrations of fear reduce adaptive mechanisms since the danger may not be viewed as significant sufficient just to respond with. Intensive anxiety, on the other hand, might limit appropriate behaviors, possibly since people conceal their anxiety instead of successfully coping only with the threat.
Several research agrees that personal duty standards should be included in PMT. Further variability in response efficacy was accounted for by both a sense of self-preservation and a conviction in third-party accountability, and a modification of the individual accountability standard was linked to an elevation in intents to participate in response efficacy. Other forms of self-control can be utilized as well (Lee and Kozar, 2005). Social standards may also have an impact on secure social media activity. Do our family as well as coworkers want, we were secure on the internet? A personalized implementation plan, as well as a constant environment for taking out the appropriate behaviors (for example, doing the malware patch each Friday morning when drinking our espresso), assists to develop habitual power for recurrent activity. Another strategy is to provide ourselves with motivation for carrying out our strategy (for example, once we finish, we treat ourselves with a doughnut) (Lee and Kozar, 2005). In the PMT research, this is referred to as control operations. There’s much that could be performed to inform consumers concerning networking protection is the state of efficient information security training. We can customize communications for specific users thanks to social media, which is very important in the process of conveying risk data (Lee and Kozar, 2005). According to the prior debate, glaringly simple but unexplained marketing or promotional like having all consumers better aware of the consequences of malware could have unintended consequences. Although there are significant distinctions predicated on population information some rather as sexuality as well as age (Lee as well as Kozar 2005), our findings recommend that a much more sophisticated direct influence on customer method is needed, one that recognizes personal consumers’ perceptions and skills particular to the internet security realm (Ulven, and Wangen, 2021).
Protection Motivation Theory for Safeguarding Students
Considering the uneven connections between threat intelligence and secure conduct, it may be inappropriate to assume from bridge research that danger knowledge induces appropriate behaviors. It was even feasible that users are becoming conscious of internet hazards and take preventative measures as a consequence of being exposed to them. However, that method appears to be similar to the one that most people may use when faced with a technical issue: Just after a ransom attempt, education about virus defense begins from a hacker appears on the computer screen. We conclude that usually the most common can be persuaded to play a much more opportunity to participate in internet security (Ulven, and Wangen, 2021). There has been significant development in identifying the main factors, or ‘sensitive areas,’ that could be handled by information literacy. We’ve tried to put them into a coherent and coherent theoretical model that has proved to be a successful foundation for treatments in those other areas of healthcare & welfare. The current research suggests that small, well-targeted treatments can be beneficial in enhancing internet safety. As a result, increasing user accountability for general digital security is an objective that may be achieved, and the Web can be a useful instrument in achieving it (Ulven, and Wangen, 2021).
Conclusion
After going through all of the above-mentioned discussion regarding the cyber security issues in universities and colleges, it could be concluded here that such institutions should be very well prepared for such cases, especially by making their staff members, as well as their students, focus over the measure which should be taken in prevention of the cyber-attacks. Besides that, it is also required to mention here that, in PMT studies, warnings frequently failed to encourage appropriate behaviors or have only little impact. According to healthcare mass information, while intermediate degrees of danger stimulates appropriate behaviors, low concentrations of fear reduce adaptive mechanisms since the danger may not be viewed as significant sufficient just to respond with. Intensive anxiety, on the other hand, might limit appropriate behaviors, possibly since people conceal their anxiety instead of successfully coping only with the threat.
References
Boehmer, J., LaRose, R., Rifon, N., Alhabash, S. and Cotten, S., 2015. Determinants of online safety behaviour: Towards an intervention strategy for college students. Behaviour & Information Technology, 34(10), pp.1022-1035.
Davinson, N. and Sillence, E., 2010. It won’t happen to me: Promoting secure behaviour among internet users. Computers in Human Behavior, 26(6), pp.1739-1747.
Gurung, A., Luo, X. and Liao, Q., 2009. Consumer motivations in taking action against spyware: an empirical investigation. Information Management & Computer Security.
Howe, A.E. and Ray, I., 2012, May. Roberts, M. In Urbanska, M., & Byrne, Z.,” The Psychology of Security for the Home Computer User,” 2012 IEEE Symposium on Security and Privacy (pp. 209-223).
LaRose, R., Rifon, N., Liu, S. and Lee, D., 2005, May. Understanding online safety behavior: A multivariate model. In The 55th annual conference of the international communication association, New York City.
Lee, Y. and Kozar, K.A., 2005. Investigating factors affecting the adoption of anti-spyware systems. Communications of the ACM, 48(8), pp.72-77.
Prensky, M., 2001. Digital natives, digital immigrants part 2: Do they really think differently?. On the horizon. Palfrey, J. and Gasser, U., 2011. Born digital: Understanding the first generation of digital natives. ReadHowYouWant. com.
Rhee, H.S., Kim, C. and Ryu, Y.U., 2009. Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & security, 28(8), pp.816-826.
Thompson, R., 2005. Why spyware poses multiple threats to security. Communications of the ACM, 48(8), pp.41-43.
Ulven, J.B. and Wangen, G., 2021. A Systematic Review of Cybersecurity Risks in Higher Education. Future Internet, 13(2), p.39.