##plugins.themes.academic_pro.article.main##

Abstract

Driven by a growing concern for the potential vulnerability of important data together with an increasing number of disruptions in the cyber- domain, many organizations have tried to study the various possible threats to their infrastructure and most of these organizations have even proposed security measures for the protection of their assets and valuable information. This paper investigates the various cyber security measures that have been enforced by the Ivy League Colleges mainly Harvard University as well as institutions of higher education in Israel and China. The Ivy League Colleges are known to be the most prestigious Colleges for higher education in the United States. The Ivy League is a collegiate athletic conference composed of sports teams from eight private institutions that offer higher education in the Northeastern United States. The name is commonly used to refer to those eight schools as a group. The eight institutions are Brown University, Columbia University, Dartmouth University, Harvard University, Princeton University, the University of Pennsylvania, and Yale University. Further this paper also looks at some of the latest cyber security tools that are being implemented and used at these institutions.
Keywords – Cyber-domain, Ivy League, Higher Education, Harvard University, Israel, China, tools

##plugins.themes.academic_pro.article.details##

Author Biography

Kanika Dhameja, Vellore Institute of Technology

Pursuing B.tech Computer Science and Engineering at VIT University, Vellore.
How to Cite
Dhameja, K. (2015). Cyber-Security Measures in Ivy League Colleges and Other Higher Educational Institutions. International Journal of Emerging Trends in Science and Technology, 2(04). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/600

References

1. Background paper on the comparative analysis of cyber security initiatives worldwide by Myriam Dumm.http://www.itu.int/osg/spu/cybersecurity/docs/ Background_Paper_Comparative_Analysis_Cybersecurity_Initiatives_Worldwide.pdf
2. Hacking Harvard published in The Harvard Crimson http://features.thecrimson.com/2013/hackers/
3. The Mouse Click That Roared published in the Korea Times. http://belfercenter.ksg.harvard.edu/publication/23396/mouse_click_that_roared.html
4. http://www.aljazeerah.info/News/2014/May/22%20n/China%20to%20Start%20Security%20Vetting%20IT%20Products,%20Following%20Charges%20of%20Cyber%20Attacks%20with%20US.ht
5. http://searchsecurity.techtarget.com/magazineContent/The-real-information-security-risk-equation
6. http://www.theinquirer.net/inquirer/news/2395638/kaspersky-fingers-nsa-style-equation-group-for-hard-drive-backdoor-epidemic
7. http://en.wikipedia.org/wiki/Equation_Group
8. http://cyberwarzone.com/cyber-security-tools-list-2014/
9. http://nces.ed.gov/pubs98/safetech/chapter9.asp