Requirements for achieving cybersecurity in Egyptian universities In light of the digital transformation from the point of view of faculty members

Document Type : Original Article

Authors

Department of Fundamentals of Education - Faculty of Education - Benha University - Arab Republic of Egypt

Abstract

       With the increasing reliance of society on digital infrastructure; Society has become faced with integrated crimes that represent a group of illegal activities and actions in the components of the Internet, which is one of the most serious challenges facing information security, and leaves behind many damages that necessitated the need to create legislation about cyberspace and its uses and laws that control it, with the need to provide a variety of safeguards. Security and security and protection systems commensurate with the nature of the new digital environment, essentially crystallized in the emergence of the so-called cyber security, which has become a strategic approach to planning, design and operation; It includes all educational, social, economic and humanitarian aspects, and has an effective impact on information and its preservation, as it is closely related to the safety of information resources in the era of digital transformation for all institutions, including universities. The digital transformation of universities by reviewing the concept of cybersecurity, its origins, dimensions, objectives and importance, and identifying the most important requirements for achieving cyber security in Egyptian universities in light of digital transformation and the most important obstacles that prevent the achievement of these requirements from the point of view of the faculty members at Benha University, the study used the descriptive approach to achieve its objectives, by preparing a questionnaire to identify the most important requirements for achieving cybersecurity at Benha University in light of digital transformation, on a sample of 248 faculty members. Which represented a set of technical, material, human and cognitive requirements, and obstacles to achieving cybersecurity requirements at Benha University.

Keywords