CYBERSECURITY ISSUES IN EDUCATIONAL INSTITUTIONS

Authors

  • Ibodullayeva Zubayda Sherzodovna Independent Researcher

Abstract

This article analyzes the growing cybersecurity threats faced by educational institutions in the digital age. As schools increasingly adopt online platforms and digital tools, they become more vulnerable to data breaches, phishing attacks, ransomware, and unauthorized access to sensitive information. The paper explores common security challenges, their impact on students and staff, and best practices for building a secure digital infrastructure. Recommendations are provided for improving cybersecurity awareness, implementing protective technologies, and developing institutional policies.

References

● Spencer, Robert (2025) The Urgency of Instituting Systemic Cybersecurity Curriculum within STEM at Secondary Educational Levels in Preparation for Postsecondary Institutions.. doi: https://core.ac.uk/download/650174434.pdf

● Sama, Hendi, Titoni, Erica, Tjahyadi, Surya (2025) Risk Analysis In Indonesian Educational Online Learning Systems: A Systematic Literature Review. doi: https://core.ac.uk/download/652146749.pdf

● Ravichandran, R, Sasikala, P, Singh, Sonam (2025) Exploring School Teachersu27 Cyber Security Awareness, Experiences, and Practices in the Digital Age. doi: https://core.ac.uk/download/643772264.pdf

● Ask, Torvald Fossåen, Juozapavičius, Aušrius, Knox, Benjamin James, Lapin, et al. (2025) Human-Centric Approach to Cyber Threat Identification: The Role of Cognition, Experience, and Education in Decision-Making. doi: https://core.ac.uk/download/646196037.pdf

● Sama, Hendi, Titoni, Erica, Tjahyadi, Surya (2025) Risk Analysis In Indonesian Educational Online Learning Systems: A Systematic Literature Review. doi: https://core.ac.uk/download/652146749.pdf

● Akhmetov, Bakhytzhan, Alimseitova, Zhuldyz, Bereke, Madina, Izbasova, et al. (2025) Estimation of the required number of nodes of a university cloud virtualization cluster. doi: https://core.ac.uk/download/642896109.pdf

● Babalola, Sunday Samson, Genga, Cheryl Akinyi (2025) Digital Transformation: The Need for a Sustainable Green Culture in African Higher Education Institutions. doi: https://core.ac.uk/download/654398721.pdf

● Ravichandran, R, Sasikala, P, Singh, Sonam (2025) Exploring School Teachersu27 Cyber Security Awareness, Experiences, and Practices in the Digital Age. doi: https://core.ac.uk/download/643772264.pdf

● Sama, Hendi, Titoni, Erica, Tjahyadi, Surya (2025) Risk Analysis In Indonesian Educational Online Learning Systems: A Systematic Literature Review. doi: https://core.ac.uk/download/652146749.pdf

● Spencer, Robert (2025) The Urgency of Instituting Systemic Cybersecurity Curriculum within STEM at Secondary Educational Levels in Preparation for Postsecondary Institutions.. doi: https://core.ac.uk/download/650174434.pdf

● Syah, Ahmad Rizki (2025) An In-depth Overview and Analysis of the Indonesian Banking Sector. doi: https://core.ac.uk/download/645569740.pdf

● Gavrysh, Iryna, Kholtobina, Oleksandra, Kryshtanovych, Myroslav, Noskova, et al. (2025) Information Modeling Methodology in the Distance Learning Process. doi: https://core.ac.uk/download/636457312.pdf

● Ravichandran, R, Sasikala, P, Singh, Sonam (2025) Exploring School Teachersu27 Cyber Security Awareness, Experiences, and Practices in the Digital Age. doi: https://core.ac.uk/download/643772264.pdf

● Dasu Vaman, Ravi Prasad (2025) Edutech For All: Bridging Gaps in Inclusive Learning. doi: https://core.ac.uk/download/639311844.pdf

● Babalola, Sunday Samson, Genga, Cheryl Akinyi (2025) Digital Transformation: The Need for a Sustainable Green Culture in African Higher Education Institutions. doi: https://core.ac.uk/download/654398721.pdf

● Iwan Permana, Setyo Widagdo, M. Nuh, M. Kholid Mawardi (2025) Technology as a Catalyst for Improving Soldier Professionalism in Modern Warfare. doi: https://core.ac.uk/download/640071010.pdf

● Ask, Torvald Fossåen, Juozapavičius, Aušrius, Knox, Benjamin James, Lapin, et al. (2025) Human-Centric Approach to Cyber Threat Identification: The Role of Cognition, Experience, and Education in Decision-Making. doi: https://core.ac.uk/download/646196037.pdf

● Ravichandran, R, Sasikala, P, Singh, Sonam (2025) Exploring School Teachersu27 Cyber Security Awareness, Experiences, and Practices in the Digital Age. doi: https://core.ac.uk/download/643772264.pdf

● Babalola, Sunday Samson, Genga, Cheryl Akinyi (2025) Digital Transformation: The Need for a Sustainable Green Culture in African Higher Education Institutions. doi: https://core.ac.uk/download/654398721.pdf

● Gavrysh, Iryna, Kholtobina, Oleksandra, Kryshtanovych, Myroslav, Noskova, et al. (2025) Information Modeling Methodology in the Distance Learning Process. doi: https://core.ac.uk/download/636457312.pdf

● Sama, Hendi, Titoni, Erica, Tjahyadi, Surya (2025) Risk Analysis In Indonesian Educational Online Learning Systems: A Systematic Literature Review. doi: https://core.ac.uk/download/652146749.pdf

● Ravichandran, R, Sasikala, P, Singh, Sonam (2025) Exploring School Teachersu27 Cyber Security Awareness, Experiences, and Practices in the Digital Age. doi: https://core.ac.uk/download/643772264.pdf

● de Silva de Alwis, Rangita (2025) Gendering the New International Convention on Cybercrimes and New Norms on Artificial Intelligence and Emerging Technologies. doi: https://core.ac.uk/download/651409983.pdf

● Flores, Mara Elaiza Augustine, Hendartho, Dony (2025) Embracing the Metaverse: Transforming Government Efficiency and Effectiveness. doi: https://core.ac.uk/download/639905758.pdf

● Ask, Torvald Fossåen, Juozapavičius, Aušrius, Knox, Benjamin James, Lapin, et al. (2025) Human-Centric Approach to Cyber Threat Identification: The Role of Cognition, Experience, and Education in Decision-Making. doi: https://core.ac.uk/download/646196037.pdf

● Association of Cyber Forensics and Threat Investigators, Elmisery, Ahmed M., Sertovic, Mirela, Watson, Paul, et al. (2025) Cyber threats in financial transactions: addressing the dual challenge of AI and quantum computing. doi: https://core.ac.uk/download/648373484.pdf

● Sama, Hendi, Titoni, Erica, Tjahyadi, Surya (2025) Risk Analysis In Indonesian Educational Online Learning Systems: A Systematic Literature Review. doi: https://core.ac.uk/download/652146749.pdf

● Barikdar, Clinton Ronjon, Das, Niropam, Das, Sachin, Goffer, et al. (2025) Cybersecurity and Supply Chain Integrity: Evaluating the Economic Consequences of Vulnerabilities in U.S. Infrastructure. doi: https://core.ac.uk/download/636457298.pdf

● Babalola, Sunday Samson, Genga, Cheryl Akinyi (2025) Digital Transformation: The Need for a Sustainable Green Culture in African Higher Education Institutions. doi: https://core.ac.uk/download/654398721.pdf

● Farooq, Ali, Khan, Naurin Farooq, Kiran, Uzma, Murtaza, et al. (2025) Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory. doi: https://core.ac.uk/download/624085571.pdf

● Alkhatib, F., Alkhatib, F. (2025) The Power of Dark Data - Exploring the Role of Data Governance. doi: https://core.ac.uk/download/647986137.pdf

● Korea Maritime Institute, Korea Research Institute of Ships and Ocean Engineering, World Maritime University (2025) Maritime digitalization and decarbonization: a sustainable future. doi: https://core.ac.uk/download/639359070.pdf

● TABLE Fuaad Aidarus (2024). Common Cyber Threats Faced by Educational Institutes. **. Retrieved from https://www.securiwiser.com/blog/common-cyber-threats-faced-by-educational-institutes/ *Note.* Adapted from Common Cyber Threats Faced by Educational Institutes, by Fuaad Aidarus, 2024. Retrieved from https://www.securiwiser.com/blog/common-cyber-threats-faced-by-educational-institutes/. Fuaad Aidarus (2024). Common Cyber Threats Faced by Educational Institutes. **. Retrieved from https://www.securiwiser.com/blog/common-cyber-threats-faced-by-educational-institutes/ *Note.* Adapted from Common Cyber Threats Faced by Educational Institutes, by Fuaad Aidarus, 2024. Retrieved from https://www.securiwiser.com/blog/common-cyber-threats-faced-by-educational-institutes/. Seren Thompson (2024). Cyber Security for Education. **. Retrieved from https://www.datalinknetworks.net/dln_blog/what-you-need-to-know-about-cyber-security-and-education *Note.* Adapted from Cyber Security for Education, by Seren Thompson, 2024. Retrieved from https://www.datalinknetworks.net/dln_blog/what-you-need-to-know-about-cyber-security-and-education. Seren Thompson (2024). Cyber Security for Education. **. Retrieved from https://www.datalinknetworks.net/dln_blog/what-you-need-to-know-about-cyber-security-and-education *Note.* Adapted from Cyber Security for Education, by Seren Thompson, 2024. Retrieved from https://www.datalinknetworks.net/dln_blog/what-you-need-to-know-about-cyber-security-and-education. Grady Andersen, MoldStud Research Team (2024). Cybersecurity for Educational Institutions: Protecting Student Privacy and Information. *MoldStud*. Retrieved from https://moldstud.com/articles/p-cybersecurity-for-educational-institutions-protecting-student-privacy-and-information *Note.* Adapted from Cybersecurity for Educational Institutions: Protecting Student Privacy and Information, by Grady Andersen, MoldStud Research Team, 2024, MoldStud. Retrieved from https://moldstud.com/articles/p-cybersecurity-for-educational-institutions-protecting-student-privacy-and-information.

● Workspace arrangement for Cyber Hygiene Seminar [FIGURE]. (2025). Retrieved from https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/MSFT_CyberSignals_8thEdition_Feature-Image.png

● Digital representation of educational technology integration. [FIGURE]. (2025). Retrieved from https://www.cisa.gov/sites/default/files/styles/hero_large/public/2023-07/HERO-K12%20Building_GLOWING-02.png?h=0cb8e0f7&itok=CfrEtpZ7

Downloads

Published

2025-05-15

How to Cite

Ibodullayeva Zubayda Sherzodovna. (2025). CYBERSECURITY ISSUES IN EDUCATIONAL INSTITUTIONS. Modern Digital Technologies in Education: Problems and Prospects, 2(5), 34–41. Retrieved from https://incop.org/index.php/mod/article/view/1560