<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.1567393</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Engineering (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Mühendisliği (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>A Novel Approach to Enhancing Active Directory Security in Academic Institutions</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-1395-1767</contrib-id>
                                                                <name>
                                    <surname>İş</surname>
                                    <given-names>Hafzullah</given-names>
                                </name>
                                                                    <aff>Batman Üniversitesi</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250107">
                    <day>01</day>
                    <month>07</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>12</volume>
                                        <issue>4</issue>
                                        <fpage>394</fpage>
                                        <lpage>402</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241015">
                        <day>10</day>
                        <month>15</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20241106">
                        <day>11</day>
                        <month>06</month>
                        <year>2024</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>This research rigorously investigates the cybersecurity frameworks within academic institutions, emphasizing the pivotal role and security of Active Directory (AD) systems. By conducting an in-depth analysis of AD infrastructures across 12 universities with critical digital environments, this study scrutinizes access control mechanisms, user identity management, and network segmentation strategies. The findings reveal profound security lapses, such as excessive administrative privileges granted to 75% of non-administrative users and the absence of Demilitarized Zones (DMZs) in 80% of the institutions. Additionally, 65% of the institutions exhibited critical vulnerabilities by not integrating public devices, such as printers and laboratory computers, into the AD framework.The study further highlights the escalating threat of cryptolocker and ransomware attacks, which have increasingly targeted institutions, resulting in significant data encryption and operational disruptions. Moreover, challenges related to the deployment and management of advanced cybersecurity solutions, like CrowdStrike, underscore the complexities in maintaining up-to-date defenses. These issues are compounded by frequent update and upgrade failures, adversely impacting AD health and overall network security.This paper delineates strategic recommendations to enhance AD security, supported by empirical evidence showing a 92% improvement in defense against cyber attacks upon implementing these measures. The insights garnered from this study are aimed at fortifying the cybersecurity postures of academic institutions, thereby mitigating the escalating threats in the digital landscape.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Active Directory</kwd>
                                                    <kwd>  Cyber Security</kwd>
                                                    <kwd>  Vulnerability</kwd>
                                                    <kwd>  System Analyse</kwd>
                                                    <kwd>  Critical Infrastructures</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	 Chilberto, J., Zaal, S., Aroraa, G., Price, E. (2020). Identity Security with Azure Active Directory. In: Cloud Debugging and Profiling in Microsoft Azure. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5437-0_7.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Crandall, Carolyn; Cole, Tony, (2022). How to stop attackers from owning your Active Directory. Cyber Security: A Peer-Reviewed Journal, Volume 5 / Number 4 / Summer 2022, pp. 294-302(9).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Guido Grillenmeier,(2023). Improving your Active Directory security posture: AdminSDHolder to the rescue. Cyber Security: A Peer-Reviewed Journal, Volume 6 / Number 3 / Spring 2023, pp. 242-260(19).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Matthew Wharton, Effectively integrating physical security technology into the operational technology domain. (2020). Cyber Security: A Peer-Reviewed Journal, Volume 4 / Number 1 / Autumn/Fall 2020, pp. 29-39(11).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Makadia, Sanam, Think beyond IT security — cyber resilience to build future-ready world : OT and ICS, critical infrastructure and beyond.(2023). Cyber Security: A Peer-Reviewed Journal, Volume 6 / Number 2 / Winter 2022–23, pp. 119-131(13).</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Microsoft Digital Defense Report (2022). Microsoft. https://www.microsoft.com, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Cissé, Moh, An ISO 27001 compliance project for a cyber security service team. (2019), Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 4 / Summer 2019, pp. 346-359(14).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Wheeler, Evan. Framing cyber security as a business risk. (2019). Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 3 / Winter 2018–19, pp. 202-210(9).</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Petruzzi, John; Loyear, Rachelle, Improving organisational resilience through enterprise security risk management. (2016). Journal of Business Continuity &amp; Emergency Planning, Volume 10 / Number 1 / Autumn/Fall 2016, pp. 44-56(13).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Wheeler, Evan.(2019). Framing cyber security as a business risk. Cyber Security: A Peer-Reviewed Journal, Volume 2 / Number 3 / Winter 2018–19, pp. 202-210(9).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	T. Tuncer, H. İŞ,(2018) Impact of End Users on Enterprise Cyber Security, International Engineering and Natural Sciences Conference,1,8, ISBN. 978-605-81971-3-8</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	T. TUNCER, H. İş, (2018), Analysis of Cyber Security Vulnerabilities in Corporate Networks, International Engineering and Natural Sciences Conference, 1,11, ISBN. 978-605-81971-3-84</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	H. İŞ, &quot;LLM-Driven SAT Impact on Phishing Defense: A Cross-Sectional Analysis,&quot; 2024 12th International Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, USA, 2024, pp. 1-5, doi: 10.1109/ISDFS60797.2024.10527274.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Hafzullah Is. 2024. Strategic Approaches to Eco-Efficient Computing in Institutional Environments. In Proceedings of the Cognitive Models and Artificial Intelligence Conference (AICCONF &#039;24). Association for Computing Machinery, New York, NY, USA, 186–190. https://doi.org/10.1145/3660853.3660910</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
