TY - JOUR T1 - A Novel Approach to Enhancing Active Directory Security in Academic Institutions AU - İş, Hafzullah PY - 2025 DA - January Y2 - 2024 DO - 10.17694/bajece.1567393 JF - Balkan Journal of Electrical and Computer Engineering PB - MUSA YILMAZ WT - DergiPark SN - 2147-284X SP - 394 EP - 402 VL - 12 IS - 4 LA - en AB - This research rigorously investigates the cybersecurity frameworks within academic institutions, emphasizing the pivotal role and security of Active Directory (AD) systems. By conducting an in-depth analysis of AD infrastructures across 12 universities with critical digital environments, this study scrutinizes access control mechanisms, user identity management, and network segmentation strategies. The findings reveal profound security lapses, such as excessive administrative privileges granted to 75% of non-administrative users and the absence of Demilitarized Zones (DMZs) in 80% of the institutions. Additionally, 65% of the institutions exhibited critical vulnerabilities by not integrating public devices, such as printers and laboratory computers, into the AD framework.The study further highlights the escalating threat of cryptolocker and ransomware attacks, which have increasingly targeted institutions, resulting in significant data encryption and operational disruptions. Moreover, challenges related to the deployment and management of advanced cybersecurity solutions, like CrowdStrike, underscore the complexities in maintaining up-to-date defenses. These issues are compounded by frequent update and upgrade failures, adversely impacting AD health and overall network security.This paper delineates strategic recommendations to enhance AD security, supported by empirical evidence showing a 92% improvement in defense against cyber attacks upon implementing these measures. The insights garnered from this study are aimed at fortifying the cybersecurity postures of academic institutions, thereby mitigating the escalating threats in the digital landscape. KW - Active Directory KW - Cyber Security KW - Vulnerability KW - System Analyse KW - Critical Infrastructures CR - [1] Chilberto, J., Zaal, S., Aroraa, G., Price, E. (2020). Identity Security with Azure Active Directory. In: Cloud Debugging and Profiling in Microsoft Azure. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5437-0_7. CR - [2] Crandall, Carolyn; Cole, Tony, (2022). How to stop attackers from owning your Active Directory. Cyber Security: A Peer-Reviewed Journal, Volume 5 / Number 4 / Summer 2022, pp. 294-302(9). CR - [3] Guido Grillenmeier,(2023). Improving your Active Directory security posture: AdminSDHolder to the rescue. Cyber Security: A Peer-Reviewed Journal, Volume 6 / Number 3 / Spring 2023, pp. 242-260(19). CR - [4] Matthew Wharton, Effectively integrating physical security technology into the operational technology domain. (2020). Cyber Security: A Peer-Reviewed Journal, Volume 4 / Number 1 / Autumn/Fall 2020, pp. 29-39(11). CR - [5] Makadia, Sanam, Think beyond IT security — cyber resilience to build future-ready world : OT and ICS, critical infrastructure and beyond.(2023). Cyber Security: A Peer-Reviewed Journal, Volume 6 / Number 2 / Winter 2022–23, pp. 119-131(13). CR - [6] Microsoft Digital Defense Report (2022). Microsoft. https://www.microsoft.com, (2023). CR - [7] Cissé, Moh, An ISO 27001 compliance project for a cyber security service team. (2019), Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 4 / Summer 2019, pp. 346-359(14). CR - [8] Wheeler, Evan. Framing cyber security as a business risk. (2019). Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 3 / Winter 2018–19, pp. 202-210(9). CR - [9] Petruzzi, John; Loyear, Rachelle, Improving organisational resilience through enterprise security risk management. (2016). Journal of Business Continuity & Emergency Planning, Volume 10 / Number 1 / Autumn/Fall 2016, pp. 44-56(13). CR - [10] Wheeler, Evan.(2019). Framing cyber security as a business risk. Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 3 / Winter 2018–19, pp. 202-210(9). CR - [11] T. Tuncer, H. İŞ,(2018) Impact of End Users on Enterprise Cyber Security, International Engineering and Natural Sciences Conference,1,8, ISBN. 978-605-81971-3-8 CR - [12] T. TUNCER, H. İş, (2018), Analysis of Cyber Security Vulnerabilities in Corporate Networks, International Engineering and Natural Sciences Conference, 1,11, ISBN. 978-605-81971-3-84 CR - [13] H. İŞ, "LLM-Driven SAT Impact on Phishing Defense: A Cross-Sectional Analysis," 2024 12th International Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, USA, 2024, pp. 1-5, doi: 10.1109/ISDFS60797.2024.10527274. CR - [14] Hafzullah Is. 2024. Strategic Approaches to Eco-Efficient Computing in Institutional Environments. In Proceedings of the Cognitive Models and Artificial Intelligence Conference (AICCONF '24). Association for Computing Machinery, New York, NY, USA, 186–190. https://doi.org/10.1145/3660853.3660910 UR - https://doi.org/10.17694/bajece.1567393 L1 - https://dergipark.org.tr/en/download/article-file/4288672 ER -