ENSURING INFORMATION SECURITY IN EDUCATIONAL INSTITUTIONS: BEST PRACTICES AND STRATEGIES

Authors

  • Mukhtarov Farrukh Muhammadovich Director of the Ferghana branch of TUIT named after Muhammad al-Khorazmi, Doctor of Philosophy (PhD) in Technical Sciences, Docent

Keywords:

information security, educational institutions, best practices, strategies, risk assessment, security policies and procedures, data encryption, cybersecurity awareness training

Abstract

Information security is essential for educational institutions of all sizes. With the increasing reliance on technology in education, there is a growing risk of cyberattacks. Educational institutions must take steps to protect their sensitive data, including student records, financial information, and intellectual property. This article discusses best practices and strategies for ensuring information security in educational institutions. It covers topics such as risk assessment, security policies and procedures, data encryption, and cybersecurity awareness training.

References

• Center for Internet Security (CIS). (2023). CIS Controls: A prioritized set of cyber defense best practices. https://www.cisecurity.org/controls

• National Institute of Standards and Technology (NIST). (2018). NIST Cybersecurity Framework (CSF): Version 1.1. https://www.nist.gov/cyberframework

• EDUCAUSE. (2022). Top 10 IT Issues in Higher Education. https://www.educause.edu/research-and-publications/research/top-10-it-issues-technologies-and-trends/2023

• Internet Society. (2023). Cybersecurity for Education. https://www.internetsociety.org/tag/cybersecurity/

• K-12 Cybersecurity Resource Center. (2023). Best Practices for K-12 Cybersecurity. https://blog.blackbaud.com/best-practices-for-protecting-your-k-12-school-from-cybersecurity-threats/

Downloads

Published

2023-10-18

How to Cite

Mukhtarov, F. . (2023). ENSURING INFORMATION SECURITY IN EDUCATIONAL INSTITUTIONS: BEST PRACTICES AND STRATEGIES. International Bulletin of Engineering and Technology, 3(10), 42–44. Retrieved from https://internationalbulletins.com/intjour/index.php/ibet/article/view/1089