Friday 26th of April 2024
 

Emergence of Robust Information Security Management Structure around the world wide Higher Education Institutions: A Multifaceted Security Solution


Jahidul Arafat, Golam Moktader Daiyan and Md. Waliullah

Polarizing the views on the emergence of Information security around the campus arenas of higher education institutions is the utmost erg of both developing and developed nations in this post catastrophic era of September 11, 2001 where the unthinkable is now potentially a daily reality with root causes of information breaching, misusing and thereby initiating terrorism which have presented the world with many challenges in accommodating peoples personal and work lives to a changed environment. To bring the resources of the academic world to bear on both national policy and on the individual responses and so thus to cope up with and to mitigate such riskier environment various IT security approaches have been proposed. While among them Soft IT Security approach (SITS) is highly lucrative now-a-days due to its simplicity and effectiveness in the sector of Information security especially in higher education, however it is unable to secure the all types of educational environment using a general framework due to not most of these environments being homogeneous also because of little focused on cultures and believes of these regions. Addressing this issue, a new security management scheme namely Robust IT Security Balancing (RITS-B) Approach is proposed in this paper which is focused on to develop such strategic framework of security environment where facts, national and regional perspectives will be merged up to lead to a proactive leadership and information security system without violating the freedom and openness that is at the very heart of the academia. A quantitative survey has been conducted and the security facts and findings are compared with the three basic survey questionnaires namely more secure than two years ago, system is secure and security program is successful with a 4 point likert scale. The analyzed data shows that institutions which implemented RITS-B approach in their arena either partially or fully feel more high in the above three domains than the others and thus increases the application area of the soft security solutions.

Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes

Download Full-Text


ABOUT THE AUTHORS

Jahidul Arafat
Jahidul Arafat is a full time faculty member of University of Liberal Arts Bangladesh in the Department of Computer Science and Engineering and Research Associate of HT Research and Consultancy, UK. He obtained his M.Sc. in Technical Education in Computer Science and Information technology from Islamic University of Technology (IUT), a subsidiary organ of OIC, Bangladesh in 2010 and BSc in Computer Science and Engineering from Military Institute of Science and Technology, Mirpur Cantonment, Bangladesh in 2008.. He is the author of two journal and three international conference papers in home and abroad. His research interest includes Image processing and information security especially at Network and policy level.

Golam Moktader Daiyan
Golam Moktader Daiyan is a full time faculty member of Southern University Bangladesh in the Department of Computer Science and Engineering. He obtained his M.Sc. Engineering in Computer Science and Engineering from Islamic University of Technology (IUT), a subsidiary organ of OIC, Bangladesh in 2011 and B.E in Computer Science and Engineering from Madurai Kamaraj University, India in 2004. His research interest includes Image processing, Computer Networks and Computer Security.

Md. Waliullah
Md. Waliullah has obtained his MSc Network & Computer Systems Security from University of Greenwich, London, UK in Dec 2010 and B.Sc. in Computer Science & Engineering from Hajee Mohammad Danesh Science & Technology University, Dinajpur, Bangladesh in Dec 2007. Also, He is a Cisco Certified Network Associate (CCNA). He is the author of two journals and one international conference papers. His research interest includes Wireless LAN security threats and Vulnerabilities, Intrusion Detection and prevention system, Secure Mobile IPV6 route optimization techniques, IT Governance and COBIT.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »