Research Article
BibTex RIS Cite

A Novel Approach to Enhancing Active Directory Security in Academic Institutions

Year 2024, Volume: 12 Issue: 4, 394 - 402, 07.01.2025
https://doi.org/10.17694/bajece.1567393

Abstract

This research rigorously investigates the cybersecurity frameworks within academic institutions, emphasizing the pivotal role and security of Active Directory (AD) systems. By conducting an in-depth analysis of AD infrastructures across 12 universities with critical digital environments, this study scrutinizes access control mechanisms, user identity management, and network segmentation strategies. The findings reveal profound security lapses, such as excessive administrative privileges granted to 75% of non-administrative users and the absence of Demilitarized Zones (DMZs) in 80% of the institutions. Additionally, 65% of the institutions exhibited critical vulnerabilities by not integrating public devices, such as printers and laboratory computers, into the AD framework.
The study further highlights the escalating threat of cryptolocker and ransomware attacks, which have increasingly targeted institutions, resulting in significant data encryption and operational disruptions. Moreover, challenges related to the deployment and management of advanced cybersecurity solutions, like CrowdStrike, underscore the complexities in maintaining up-to-date defenses. These issues are compounded by frequent update and upgrade failures, adversely impacting AD health and overall network security.
This paper delineates strategic recommendations to enhance AD security, supported by empirical evidence showing a 92% improvement in defense against cyber attacks upon implementing these measures. The insights garnered from this study are aimed at fortifying the cybersecurity postures of academic institutions, thereby mitigating the escalating threats in the digital landscape.

References

  • [1] Chilberto, J., Zaal, S., Aroraa, G., Price, E. (2020). Identity Security with Azure Active Directory. In: Cloud Debugging and Profiling in Microsoft Azure. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5437-0_7.
  • [2] Crandall, Carolyn; Cole, Tony, (2022). How to stop attackers from owning your Active Directory. Cyber Security: A Peer-Reviewed Journal, Volume 5 / Number 4 / Summer 2022, pp. 294-302(9).
  • [3] Guido Grillenmeier,(2023). Improving your Active Directory security posture: AdminSDHolder to the rescue. Cyber Security: A Peer-Reviewed Journal, Volume 6 / Number 3 / Spring 2023, pp. 242-260(19).
  • [4] Matthew Wharton, Effectively integrating physical security technology into the operational technology domain. (2020). Cyber Security: A Peer-Reviewed Journal, Volume 4 / Number 1 / Autumn/Fall 2020, pp. 29-39(11).
  • [5] Makadia, Sanam, Think beyond IT security — cyber resilience to build future-ready world : OT and ICS, critical infrastructure and beyond.(2023). Cyber Security: A Peer-Reviewed Journal, Volume 6 / Number 2 / Winter 2022–23, pp. 119-131(13).
  • [6] Microsoft Digital Defense Report (2022). Microsoft. https://www.microsoft.com, (2023).
  • [7] Cissé, Moh, An ISO 27001 compliance project for a cyber security service team. (2019), Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 4 / Summer 2019, pp. 346-359(14).
  • [8] Wheeler, Evan. Framing cyber security as a business risk. (2019). Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 3 / Winter 2018–19, pp. 202-210(9).
  • [9] Petruzzi, John; Loyear, Rachelle, Improving organisational resilience through enterprise security risk management. (2016). Journal of Business Continuity & Emergency Planning, Volume 10 / Number 1 / Autumn/Fall 2016, pp. 44-56(13).
  • [10] Wheeler, Evan.(2019). Framing cyber security as a business risk. Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 3 / Winter 2018–19, pp. 202-210(9).
  • [11] T. Tuncer, H. İŞ,(2018) Impact of End Users on Enterprise Cyber Security, International Engineering and Natural Sciences Conference,1,8, ISBN. 978-605-81971-3-8
  • [12] T. TUNCER, H. İş, (2018), Analysis of Cyber Security Vulnerabilities in Corporate Networks, International Engineering and Natural Sciences Conference, 1,11, ISBN. 978-605-81971-3-84
  • [13] H. İŞ, "LLM-Driven SAT Impact on Phishing Defense: A Cross-Sectional Analysis," 2024 12th International Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, USA, 2024, pp. 1-5, doi: 10.1109/ISDFS60797.2024.10527274.
  • [14] Hafzullah Is. 2024. Strategic Approaches to Eco-Efficient Computing in Institutional Environments. In Proceedings of the Cognitive Models and Artificial Intelligence Conference (AICCONF '24). Association for Computing Machinery, New York, NY, USA, 186–190. https://doi.org/10.1145/3660853.3660910
Year 2024, Volume: 12 Issue: 4, 394 - 402, 07.01.2025
https://doi.org/10.17694/bajece.1567393

Abstract

References

  • [1] Chilberto, J., Zaal, S., Aroraa, G., Price, E. (2020). Identity Security with Azure Active Directory. In: Cloud Debugging and Profiling in Microsoft Azure. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5437-0_7.
  • [2] Crandall, Carolyn; Cole, Tony, (2022). How to stop attackers from owning your Active Directory. Cyber Security: A Peer-Reviewed Journal, Volume 5 / Number 4 / Summer 2022, pp. 294-302(9).
  • [3] Guido Grillenmeier,(2023). Improving your Active Directory security posture: AdminSDHolder to the rescue. Cyber Security: A Peer-Reviewed Journal, Volume 6 / Number 3 / Spring 2023, pp. 242-260(19).
  • [4] Matthew Wharton, Effectively integrating physical security technology into the operational technology domain. (2020). Cyber Security: A Peer-Reviewed Journal, Volume 4 / Number 1 / Autumn/Fall 2020, pp. 29-39(11).
  • [5] Makadia, Sanam, Think beyond IT security — cyber resilience to build future-ready world : OT and ICS, critical infrastructure and beyond.(2023). Cyber Security: A Peer-Reviewed Journal, Volume 6 / Number 2 / Winter 2022–23, pp. 119-131(13).
  • [6] Microsoft Digital Defense Report (2022). Microsoft. https://www.microsoft.com, (2023).
  • [7] Cissé, Moh, An ISO 27001 compliance project for a cyber security service team. (2019), Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 4 / Summer 2019, pp. 346-359(14).
  • [8] Wheeler, Evan. Framing cyber security as a business risk. (2019). Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 3 / Winter 2018–19, pp. 202-210(9).
  • [9] Petruzzi, John; Loyear, Rachelle, Improving organisational resilience through enterprise security risk management. (2016). Journal of Business Continuity & Emergency Planning, Volume 10 / Number 1 / Autumn/Fall 2016, pp. 44-56(13).
  • [10] Wheeler, Evan.(2019). Framing cyber security as a business risk. Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 3 / Winter 2018–19, pp. 202-210(9).
  • [11] T. Tuncer, H. İŞ,(2018) Impact of End Users on Enterprise Cyber Security, International Engineering and Natural Sciences Conference,1,8, ISBN. 978-605-81971-3-8
  • [12] T. TUNCER, H. İş, (2018), Analysis of Cyber Security Vulnerabilities in Corporate Networks, International Engineering and Natural Sciences Conference, 1,11, ISBN. 978-605-81971-3-84
  • [13] H. İŞ, "LLM-Driven SAT Impact on Phishing Defense: A Cross-Sectional Analysis," 2024 12th International Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, USA, 2024, pp. 1-5, doi: 10.1109/ISDFS60797.2024.10527274.
  • [14] Hafzullah Is. 2024. Strategic Approaches to Eco-Efficient Computing in Institutional Environments. In Proceedings of the Cognitive Models and Artificial Intelligence Conference (AICCONF '24). Association for Computing Machinery, New York, NY, USA, 186–190. https://doi.org/10.1145/3660853.3660910
There are 14 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Araştırma Articlessi
Authors

Hafzullah İş 0000-0002-1395-1767

Early Pub Date January 13, 2025
Publication Date January 7, 2025
Submission Date October 15, 2024
Acceptance Date November 6, 2024
Published in Issue Year 2024 Volume: 12 Issue: 4

Cite

APA İş, H. (2025). A Novel Approach to Enhancing Active Directory Security in Academic Institutions. Balkan Journal of Electrical and Computer Engineering, 12(4), 394-402. https://doi.org/10.17694/bajece.1567393

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı