Cybersecurity Posture in Digital Educational Institutions: An Assessment Using the CyberSecurity Rubric Based on the NIST CSF 2.0
DOI:
https://doi.org/10.15381/risi.v17i2.29671Keywords:
Cybersecurity, NIST CSF, Education, Higher educationAbstract
During the pandemic and post-pandemic, the entire educational system was challenged to improve the conditions of continuity and quality of learning by adapting to remote emergency education, which forced many institutions to invest in digital educational platforms, tools for virtual classes, technological equipment, virtual material and teacher training. Cyber-attacks, which are increasing every year, pose a challenge to the education sector, mainly due to no or low cybersecurity awareness and lack of an information security management plan. This article focuses on a case study conducted to a Technical-Productive Education Center (CETPRO) that belongs to UGEL 02, and that relies on digital applications, services and devices to carry out its daily duties. The CETPRO has never developed or implemented a cybersecurity management plan that would allow it to comply with the Personal Data Protection Law (29733) and protect its digital assets. To address these concerns, the use of a cybersecurity rubric aligned to NIST CSF 2.0 is proposed and has been adjusted to assess the cybersecurity posture of any educational institution. This rubric allows for measuring the overall maturity level in the six NIST functions of Govern, Identify, Protect, Detect, Respond, and Recover. It is expected that the I.E. will be able to know the current state of its cybersecurity posture allowing it to make future decisions to implement a cybersecurity management plan and improve its maturity level.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Handz Valentin Huiza

This work is licensed under a Creative Commons Attribution 4.0 International License.
AUTHORS RETAIN THEIR RIGHTS:
a. Authors retain their trade mark rights and patent, and also on any process or procedure described in the article.
b. Authors retain their right to share, copy, distribute, perform and publicly communicate their article (eg, to place their article in an institutional repository or publish it in a book), with an acknowledgment of its initial publication in the Revista de investigación de Sistemas e Informática.
c. Authors retain theirs right to make a subsequent publication of their work, to use the article or any part thereof (eg a compilation of his papers, lecture notes, thesis, or a book), always indicating its initial publication in the Revista de investigación de Sistemas e Informática (the originator of the work, journal, volume, number and date).