<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Higher education cyber resilience: Intelligent protection of educational, administrative and resource systems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Olena Kryvoruchko</string-name>
          <email>ev_kryvoruchko@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yaroslav Shestak</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elizaveta Zavhorodnya</string-name>
          <email>y.zavhorodnya@knute.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andriy Fesenko</string-name>
          <email>aafesenko88@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>15 Heroiv Oborony str., 03041 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Trade and Economics</institution>
          ,
          <addr-line>19 Kyoto str., 02156 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State university “Kyiv Aviation Institute”</institution>
          ,
          <addr-line>1 Lubomyra Guzara ave., 03058 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>117</fpage>
      <lpage>131</lpage>
      <abstract>
        <p>This paper focuses on the cybersecurity system of a higher education institution (HEI) as a key element of ensuring the reliability and sustainability of its information infrastructure. The imperative to develop an effective cybersecurity system necessitates a comprehensive analysis of the information infrastructure of a higher education institution, including its: objects, interconnections, data transmission channels, communication tools, regulatory documentation and mechanisms for interaction with external infrastructures. In addition, the components of the information infrastructure of higher education institutions are considered and arranged into three main groups: educational, administrative and resource systems. Particular attention is given to an overview of the main cybersecurity risks and the consequences higher education institutions face in the event of successful cyberattacks by malicious actors. Furthermore, the study formulates the principles and proposes the main criteria that a comprehensive cybersecurity system in a higher education institution should meet. The main stages of implementing a comprehensive cybersecurity system architecture of higher education institutions have been outlined and characterised, as well as the main constraints to the implementation of each of these stages. For a deeper understanding of this infrastructure, the study also proposes its modelling as a means of assessing the current state, forecasting development trajectories, and analysing the impact of implementing modern computing tools and applications.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cybersecurity</kwd>
        <kwd>information infrastructure</kwd>
        <kwd>information technologies</kwd>
        <kwd>modelling</kwd>
        <kwd>model</kwd>
        <kwd>cybersecurity system architecture</kwd>
        <kwd>cyber defence systems</kwd>
        <kwd>cyber resilience of infrastructure</kwd>
        <kwd>neural network technologies</kwd>
        <kwd>communication networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>At the current stage of development of higher education institutions (HEIs), ensuring the effective
functioning of a cybersecurity system has become critically important, as it is a prerequisite for the
stable and uninterrupted operation of the HEI’s information infrastructure. Such a system
encompasses all actors within both the internal and external information environment (including
clients) and is aimed at protecting against cyber threats, attacks and unauthorised interference in
information processes. The cybersecurity system constitutes a set of organisational and technical
measures designed to detect external and internal threats, identify potential vulnerabilities and
implement protection mechanisms. Its functioning is based on the provisions of the Decree of the
Ukraine’. The information infrastructure of a higher education institution should be regarded as a
functional system that depends on the interaction of its structural elements and their functional
capacities.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>Scholars have approached the study of the systems in question from various perspectives. In
particular, the implementation and use of protection technologies and systems in HEIs have been
explored by A. Androshchuk, V. Afanasiev, V. Hryha, S. Ivanova, O. Dubach, O. Kosenko,
M. Shyshkina, Y. Nosenko, L. Zabrodska, V. Kremen, B. Odiagailo, P. Orlov, L. Fishman, S. Londar,
O. Bryniuk, S. Dvoretska, O. Shpak, V. Luzhetskyi, O. Bilyk, etc.</p>
      <p>In the process of developing an effective cybersecurity system of HEIs’ information
infrastructure, the use of modelling methods is of paramount importance. These methods make it
possible to represent complex information processes, analyse potential threats, and anticipate the
consequences of introducing advanced technologies. In this context, particular attention should be
paid to the approach proposed by Prus A. [1, p. 58–59], who describes mathematical modelling as a
‘lens of the real world’ and identifies four groups of competencies that are critically important for
successful implementation of modelling process.</p>
      <p>In particular, the first group of competencies emphasises a deep understanding of the problem,
the formulation of realistic assumptions and the ability to distinguish between relevant and
irrelevant information, which is essential for analysing cyber threats. The second group involves
construction of a mathematical model based on real-world conditions, simplification, and use of
appropriate visualisation methods, enabling an accurate representation of the architecture of the
information infrastructure and its vulnerabilities. The third group focuses on interpreting
mathematical results within HEI’s actual operational environment, while the fourth concerns the
critical evaluation of the model’s adequacy, its flexibility, and readiness for adaptation in response
to changes in cyber environment.</p>
      <p>Thus, the application of modelling to the HEIs’ information infrastructure within cybersecurity
system should be viewed not merely as a technical process, but as a comprehensive
competencebased activity that encompasses analysis, formalisation, interpretation, and critical reflection on the
results obtained.</p>
      <p>The information infrastructure of a higher education institution comprises a set of information
systems, communication tools, users, databases, servers, gateways, access control systems, etc. To
ensure the stability of the information infrastructure, encryption protocols such as AES-256,
SSL\TLS can be employed, which enhance the resilience of information systems against
cyberattacks. Given the inherent risks of the internet environment, it is not recommended to use
information resources without adhering to established security protocols. Therefore, building a
robust cyber security system and conducting continuous monitoring of all information systems is
of critical importance, which includes vulnerability assessments, updates and implementation of
security protocols, password policy enforcement (e.g., generation and regular renewal of strong
passwords), users and administrators notifications regarding system breaches or intrusion
attempts, blocking of potentially malicious users, and thorough analysis of incidents and their
consequences. To identify and effectively deploy all the aforementioned security tools, protection
systems, and mechanisms, artificial intelligence procedures should be applied to enable in-depth
analysis, the modelling of cyberattack prototypes, and the forecasting of potential consequences
through the use of neural networks.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Organisational approaches to protecting the information infrastructure of a higher education institution</title>
      <p>In order to provide high-quality educational services, conduct cutting-edge sectoral research,
ensure effective institutional governance, and maintain a competitive position in the educational
services market, higher education institutions must be capable of offering educators, researchers,
staff, and students reliable and uninterrupted access to their digital environment, represented by
information infrastructure, including digital platforms, communication networks, data
transmission systems, and cybersecurity systems. At the same time, preserving institutional
integrity and the trust of all stakeholders depends on the HEI’s ability to guarantee cybersecurity,
data privacy and resilience to cyber threats.</p>
      <p>The concept of cyber resilience has become an important strategic goal for HEIs in light of rapid
digital transformation. In order to support the continuity, quality and security of academic and
operational procedures, HEIs are increasingly dependent on complex information infrastructures
that encompass various administrative, educational and resource systems. However, as reliance on
technology increases, so does vulnerability to a wide range of cyber threats. Therefore, it is crucial
to first identify and classify core elements of HEIs’ digital environment in order to design smart
and adaptive cybersecurity measures. Table 1 below presents the main components of an HEI’s
information infrastructure, grouped into three functional categories: resource systems,
administrative systems, and educational systems.</p>
      <sec id="sec-3-1">
        <title>Course materials, assignments, grades, student-teacher communication logs Video lectures, tutorials, quizzes, participation data</title>
      </sec>
      <sec id="sec-3-2">
        <title>Transcripts, enrolment data, exam schedules, attendance logs Lab reports, input-output datasets, simulation parameters</title>
        <p>Individual study plans, advising notes, academic
history
Student submissions, plagiarism reports</p>
      </sec>
      <sec id="sec-3-3">
        <title>Question banks, exam results, timing records</title>
      </sec>
      <sec id="sec-3-4">
        <title>Students CVs, job applications, employer data</title>
      </sec>
      <sec id="sec-3-5">
        <title>Payrolls, invoices, grants, tuition payments</title>
      </sec>
      <sec id="sec-3-6">
        <title>Staff personal data, performance reviews, salary information Contracts, regulations, meeting minutes</title>
      </sec>
      <sec id="sec-3-7">
        <title>Admissions &amp; Enrollment Personal applicant data, test scores, admission Systems decisions</title>
      </sec>
      <sec id="sec-3-8">
        <title>Scheduling &amp; Timetabling Class schedules, room use logs, lecturer assignments Systems Campus Security &amp; Incident logs, security video metadata, reports Incident Reporting</title>
        <p>Communications &amp;
Notification Systems
ICT Infrastructure Logs, IP traffic, server load data
Monitoring &amp; Control
Systems
Library Information Book records, research access logs, borrower data
Systems
Research Information Research proposals, grants, institutional affiliations</p>
      </sec>
      <sec id="sec-3-9">
        <title>Bulk emails, official notices, student and staff contacts 119</title>
      </sec>
      <sec id="sec-3-10">
        <title>Systems</title>
        <p>Access Control &amp; Identity User roles, biometric scans, access logs
Management Systems
Asset &amp; Inventory
Management Systems
Energy &amp; Facility
Management Systems
Cloud Storage &amp; Backup
Systems
Software Licensing &amp;
Deployment Systems</p>
      </sec>
      <sec id="sec-3-11">
        <title>Energy usage data, sensor data, schedules</title>
      </sec>
      <sec id="sec-3-12">
        <title>Course files, administrative backups, personal folders</title>
      </sec>
      <sec id="sec-3-13">
        <title>License keys, installation tracking, usage analytics</title>
      </sec>
      <sec id="sec-3-14">
        <title>Serial numbers, condition reports, usage records</title>
        <p>
          In particular, studies [
          <xref ref-type="bibr" rid="ref2 ref3 ref4">2–4</xref>
          ] indicate that in 2024 alone, higher education institutions were one of
the most targeted sectors of the economy: 66% of respondents reported experiencing cyberattacks,
and 79% faced at least one security incident. Although data theft was the least frequently reported
type of breach, only 18% of HEIs officially disclosed such incidents. Nevertheless, the overall impact
of cyberattacks was significant and often severe. The most dangerous threat remains ransomware,
as the majority of affected HEIs ended up paying up to 122% of the initial ransom demand, with an
average pay-out of USD 5.85 million—ranking the third highest among all sectors. Additionally,
half of the affected HEIs reported direct damage to their ICT infrastructure, while over 60%
experienced substantial operational and financial disruptions. Moreover, in 77% of cases, the data
was encrypted, and in 95% of cases, attackers attempted to access backups, thus significantly
complicating recovery efforts [
          <xref ref-type="bibr" rid="ref2 ref3 ref4">2–4</xref>
          ].
        </p>
        <p>
          In light of these challenges, it is essential to clearly define the principles that a comprehensive
cybersecurity system for higher education institutions must uphold in order to provide
allencompassing protection for institutional systems and resources. These principles include
[5, p. 140–142]: the principle of confidentiality, the principle of integrity, the principle of
availability of information and resources at the right time for authorised users, the principle of
monitoring and evaluating security systems, the principle of legal compliance, the principle of
accountability for actions within the HEI’s information infrastructure, the principle of digital risk
management, the principle of security awareness among all users of the HEI’s information
infrastructure, the principle of adaptive security architecture, the principle of zero trust, the
principle of resilience of HEI’s information systems, the principle of HEI’s data sovereignty, and
the principle of integrated threat analysis from both internal and external sources within the
security architecture, to enable proactive threat prediction and response [
          <xref ref-type="bibr" rid="ref6 ref7 ref8 ref9">6–9</xref>
          ].
        </p>
        <p>It is noteworthy that the cybersecurity system architecture of a higher education institution
constitutes an organised set of policies, tools, procedures, and control mechanisms that interact to
protect the institution’s data infrastructure from cyberattacks. This architecture defines the design,
implementation mechanisms, interrelationships, and governance of security components to ensure
the availability, confidentiality, integrity, and resilience of administrative, resource, and
educational systems. Moreover, a comprehensive and integrated cybersecurity architecture in an
HEI must meet several key criteria, specifically it should:




</p>
        <p>Align with the academic mission, strategic goals and HEI’s digital transformation priorities.
Be based on a risk-oriented strategy that includes frequent risk assessments and threat
modelling tailored to the higher education context.</p>
        <p>Ensure the protection of the HEI’s network, endpoints, applications, data and user layer
through a multi-layered security system.</p>
        <p>Include protective mechanisms that guarantee the availability, confidentiality, and integrity
of data across all administrative, resource, and educational systems.</p>
        <p>Comply with national regulations and international standards.</p>
        <p>Be adaptive and scalable to accommodate future growth, the integration of emerging
technologies, and evolving cyber threats.</p>
        <p>Be capable of employing SIEM and advanced analytical tools for automated incident
response, real-time threat detection, and continuous monitoring.</p>
        <p>Support backup procedures, failover strategies, and disaster recovery planning.</p>
        <p>Enforce strict verification of all users and devices.</p>
        <p>Integrate both internal and external threat intelligence sources.</p>
        <p>Incorporate mechanisms for regular auditing, compliance verification, and evaluation for
security system’s effectiveness.</p>
        <p>Be governed by clearly defined roles, responsibilities, and protocols for resource allocation,
decision-making, and incident escalation.</p>
        <p>Preserve sovereignty over private and confidential data while ensuring secure data sharing,
collaboration, and research activities.</p>
        <p>In particular, the development of such a comprehensive cybersecurity system for a HEI involves
several stages, each with its own objectives and tasks:
1. Preliminary assessment and strategic planning (conducted to establish a foundational
understanding of the current state of cybersecurity within the HEI and to define strategic
goals for the security architecture), including identification and classification of HEI’s
information infrastructure critical components (educational, administrative, and resource
systems), evaluation of existing cybersecurity policies, technologies, and practices; analysis
of applicable regulatory requirements; as well as defining cybersecurity goals in alignment
with the HEI’s mission and digital transformation strategy.</p>
        <p>The implementation of this stage can be hindered by several factors, including: lack of
commitment from senior leadership regarding cybersecurity; absence of a comprehensive and
upto-date inventory of digital assets, leading to “blind spots” in planning; fragmented governance
structures and unclear cybersecurity management responsibilities; insufficient awareness of the
applicable cybersecurity regulations within HEIs; limited financial and human resources;
misalignment between IT planning and academic planning; absence of a formal cybersecurity
governance framework.</p>
        <p>Risk assessment and threat modelling (conducted to identify, analyse and prioritise
potential cyber threats, vulnerabilities and risks specific to the HEI environment), which
entails performing a comprehensive risk assessment across all HEI’s systems, developing a
model of internal and external threats to its information security, evaluating the likelihood
and impact of various cyber incidents, identifying high-risk zones for prioritised protection,
and creating a formal risk register.</p>
        <p>The successful completion of this stage may be hampered by several factors, including the lack
of standardised methodologies for identifying and analysing cyber risks; insufficient
documentation of past cyber incidents; limited awareness of cyber risks specific to the education
sector (which affects modelling accuracy); underestimation of internal threats, as well as mismatch
between identified risks and mitigation measures; over-reliance on outdated cyber threat models;
and limited access to real-time cyber threat intelligence.</p>
        <p>Architectural design and development of the “framework” (aimed at creating a structured,
multi-layered security system that defines the functional and technical components of the
cybersecurity system), that involves developing a multi-layered defence model (covering
network, software, data, identities, and endpoint security), defining security domains and
access control mechanisms, integrating core security technologies into the design,
implementing key security principles, and ensuring that the architecture complies with
international standards and best practices.</p>
        <p>Barriers to developing a reliable cybersecurity architecture for HEIs may include a lack of
technical expertise in secure architectural design; limited stakeholder involvement; ambiguity in
defining access rights and responsibilities; excessive dependence on a single vendor for
hardware/software/technology solutions; lack of documentation of architectural solutions; and
failure to consider future scalability, interoperability, and modularity.</p>
        <p>4. Implementation and integration (focused on deploying cybersecurity tools, controls and
policies in accordance with the developed architecture and institutional requirements),
which includes the procurement, configuration and integration of cybersecurity
technologies and platforms, implementation of identity and access management systems,
application of encryption/authentication/monitoring mechanisms and endpoint protection
mechanisms, establishment of incident response protocols and backup solutions, as well as
coordination of deployment across HEI’s departments.</p>
        <p>Challenges during this stage may arise from operational disruptions in academic and
administrative processes during system deployment; inadequate communication and coordination
between IT staff and academic or administrative units; compatibility issues between new and
legacy systems; incomplete configuration of cybersecurity tools; delays in approval and
procurement processes; inadequate testing prior to full deployment; and the absence of a
comprehensive system change management strategy.</p>
        <p>Testing, verification and optimisation (conducted to assess the functionality, effectiveness
and reliability of the implemented cybersecurity architecture), which includes penetration
testing/vulnerability assessment/system audits, etc., verification of compliance with internal
security policies and external regulatory standards, analysis of incident logs and monitoring
of system behaviour under stress conditions, identification of weak points and performance
issues, as well as optimisation of configuration and workflows based on test results.</p>
        <p>The successful implementation of this stage may be complicated by the HEI’s limited capacity to
conduct thorough security testing; reluctance to schedule cybersecurity system downtime for
testing (especially during academic semesters); lack of documented performance metrics for
cybersecurity system operations; inadequate tools for detecting and monitoring cyber threats;
resistance to implementing changes based on test results; and refusal to engage independent
auditors.</p>
        <p>User training and awareness raising (aimed at fostering institutional cyber hygiene by
educating users and administrators about security protocols, risks and responsibilities),
which involves designing and delivering regular cybersecurity training for staff, students
and administrators, as well as disseminating instructions and policies in accessible formats,
encouraging reporting of suspicious activity within HEI’s information systems, etc.</p>
        <p>The effectiveness of this stage may be limited by the perception among staff, faculty and
students that cybersecurity training is optional; one-off or outdated approaches to cybersecurity
training; insufficient integration of cybersecurity knowledge and practices into the institutional
culture of the HEI; inconsistent enforcement of cybersecurity policies; and lack of feedback
mechanisms to evaluate training outcomes.</p>
        <p>Continuous monitoring and lifecycle management of the cybersecurity system (conducted
to ensure the ongoing effectiveness, adaptability and resilience of the cybersecurity
architecture), which includes the implementation of continuous monitoring tools, regular
updates to threat intelligence channels and security policies, review and update of the
architecture in response to new risks/incidents/institutional changes, as well as periodic
performance audits and compliance reviews, etc.</p>
        <p>The implementation and effectiveness at this stage may be hindered by limited real-time
visibility of network activity; insufficient integration with cyber threat intelligence systems; budget
constraints and resource shortages for updating and maintaining cybersecurity infrastructure; lack
of automation, excessive reliance on manual monitoring and delays in cyber incident response
procedures; fragmented monitoring systems across HEI’s information infrastructure; and the
absence of regular security audits and system reviews.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Modelling the information infrastructure of a higher education institution</title>
      <p>One of the key challenges in building an effective cyber defence system within HEI’s information
infrastructure is the absence of unified standards for structuring information: each HEI operates
under its own specific institutional characteristics, internal policies and regulated procedures,
which necessitates the use of additional protocols, interfaces, queries and communication tools to
facilitate interaction between subsystems and controlled access to resources. It is important to note
that modern communication tools that are capable of adaptive information transfer in compliance
with established security protocols are already used.</p>
      <p>In the context of cyber defence system modelling, it is essential to recognise that the resilience
of information systems to cyber-attacks, unauthorised access or destruction attempts is one of the
key criteria for its reliability. The construction of such a system requires, first and foremost,
rigorous definition of organisational security measures, the design of secure communication
channels and strict adherence to established procedures. All system users must undergo
authentication and, in some cases, multi-factor identification is required (e.g. via SMS, mobile
applications, digital keys, electronic digital signatures (EDS), qualified electronic signatures (QES),
UES, cloud-based QES, biometric data).</p>
      <p>A way to strengthen the cyber resilience of the HEI infrastructure is to implement modern
cryptographic protocols, such as AES-256, SSL/TLS, which significantly reduce the risk of
intrusion. However, even the most advanced technical solutions are ineffective without continuous
system monitoring, detection of vulnerabilities, timely updating of security mechanisms and
thorough incident analysis. Models should incorporate recommendations for regular password
changes, blocking suspicious activities, alerting responsible personnel, and clearly defined threat
response mechanisms.</p>
      <p>
        In this process, it is important to use artificial intelligence tools, especially for simulating
prototypes of potential cyber-attacks, predicting their consequences and constructing adaptive
response systems. The application of neural network technologies significantly expands the scope
of classical modelling, aligning with the conceptual approach to modelling as a method for
understanding the real-world functioning of complex systems, as substantiated by Prus A. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>It is also important to emphasise that the use of a knowledge base in combination with artificial
intelligence (AI) tools opens new opportunities for managing the information infrastructure of
higher education institutions. Such systems enable not only the analysis of available data, but also
to filtering, generation, selection and recommendation of effective development strategies for
information systems. This approach ensures both the integrity and flexibility of the infrastructure
operations, supports predictive modelling of its evolution, as well as facilitates timely responses to
deviations from the expected outcomes. System performance monitoring becomes a continuous
and automated process, significantly increasing the reliability and resilience of the educational
environment against external threats and internal disruptions.</p>
      <p>In this context, the use of neural networks in managing educational processes holds strategic
importance. Neural networks can adapt HEI’s infrastructure to new educational challenges, foster
digital transformation, expand the range of educational services, attract more students, and
individualise the provision of system resources according to the needs of each user.</p>
      <p>
        The development of an intelligent system based on a robust knowledge base and neural network
algorithms creates a powerful decision-support environment. Such a system performs not only user
authentication functions, but also autonomously adapts content, routes data to external
infrastructures such as a Smart City ecosystem, e-Government platforms, international research
networks, etc., thus expanding its applicability from the local level (within a HEI or city) to the
national and global educational and scientific cyberspace [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19">10–19</xref>
        ].
      </p>
      <p>As a result, HEI’s information systems can interact with each other, adhering to international
standards, supporting data exchange and ensuring secure operation within an open digital
environment. This lays the groundwork for the deploying isolated subsystems, in particular, for
scientific experiments, cyber threats modelling, testing security protocols, etc. (see Figure 1). All
these factors directly affect the development of HEI’s information infrastructure and its capacity
for adaptation, resilience and innovation.</p>
      <p>In addition to the resources distributed by the HEI among its stakeholders, there exists a
managed environment for secure connectivity and control of information flows, which
incorporates gateways and firewalls that distributes resource load across the HEI’s information
infrastructure.</p>
      <p>Figure 2 presents a model of all HEI’s resources and their optimal communication pathways.
Despite the extensive deployment of computers, communication systems, databases, and access to
external information resources, all users within HEI’s information infrastructure operate under
certain limitations related to resource access. The lack of system-wide unification means that
administrators manage each system and provide access rights separately. Consequently, any
structural changes (such as modifications in personnel roles or responsibilities) can cause
complications in updating user permissions and allocating new access rights across various HEI’s
systems. This approach illustrates a significant drawback of the uncoordinated information and
automated systems in use within the same HEI’s infrastructure. The model reveals that the
electronic network is excessively large and administratively complex, as well as it covers the entire
HEI’s campus, and enables all infrastructure users to participate in the system management based
on their access level. The viability of the HEI’s entire network is regulated by national legal
frameworks and HEI’s policy documents. The design of information security systems should
consider the peculiarities and specifics of the HEI. Thus, the components of the information
infrastructure include a physical communication network, switching devices, wireless access
points, computers, servers, FireWall, and the Internet connectivity. To protect specific segments of
the infrastructure, multi-layered managed switches (upon which firewalls are built) are deployed to
secure HEI’s information resources.</p>
      <p>Particular attention is given to ensuring secure access to Internet. Therefore, all infrastructure
elements are connected via hybrid wired and wireless switching network, allowing predefined
resources to be accessible regardless of whether personnel are physically present at their
workstations. Also, all HEI’s resource servers are hosted internally within HEI’s network and are
operated and maintained by system administrators. Secure access to HEI’s information resources is
ensured through VPN configurations, which provide encrypted and authenticated connectivity to
internal systems.</p>
      <p>It should be noted that the model in Figure 2 lacks clearly defined and structured mechanisms
for managing the components of HEI’s information infrastructure. In addition, Figure 2 illustrates a
model of the resource protection system of HEI’s information infrastructure.</p>
      <p>
        Thus, the HEI employs a software-based protection model with resource load auditing for the
HEI’s information infrastructure. Its main and arguably only advantage is the ability to manage
automated educational systems independently, manually, and with direct access. However, this
advantage can also be considered the most significant disadvantage: the approach relies heavily on
human resources with the expertise to administer different automated systems, who must
coordinate efforts across various internal or external information automated systems. As a result,
this infrastructure becomes costly and highly dependent on qualified IT specialists to maintain and
manage all the HEI’s automated systems. Thus, the management of the HEI’s via information
systems remains poorly automated and requires significant technical coordination. Moreover,
building an effective cybersecurity system is challenging due to varying configurations and
inconsistent access rights across different automated systems.
One of the main shortcomings of this approach is the fragmentation of information systems and
database management mechanisms, which fail to provide comprehensive capabilities for data
analysis or for adjusting resource access based on whenever a participant (e.g. (teacher or student)
is on-site or accessing remotely. The administration of the HEI and its information resources is
primarily conducted manually, with limited oversight due to weak feedback mechanisms. A large
number of IT specialists with diverse competencies are required to ensure the administration of all
components of HEI’s information infrastructure. Access can be affected due to changes in the
operation of managed switches and power outages, both of which can impact the performance of
the entire HEI’s information infrastructure. All devices (e.g. gadgets, laptops, and other wireless
equipment and resources) are connected through switching mechanisms that provide constant
network control and monitoring. For a comprehensive system map, all resource elements of the
database infrastructure used by the information system must be analysed, revealing the
vulnerability of HEI user databases. Effective coordination of information flows requires system
interventions to support decision-making and resolve basic queries through interactive interfaces.
Another significant issue is the lack of reliable data about individual users of HEI’s systems [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23 ref24 ref25 ref26">20–
26</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Model of higher education institution information infrastructure: intelligent access, needs analytics and cybersecurity</title>
      <p>All of the aforementioned shortcomings can be addressed by implementing an intelligent control
centre for HEI’s information infrastructure built on the basis of a central control hub that utilises
neural network algorithms. The system of HEI’s information infrastructure proposed herein
incorporates an intelligent centre, which leverages neural networks to enable comprehensive and
rapid analysis of the entire information infrastructure and offer optimised solutions to operational
issues.</p>
      <p>Figure 3 shows a model of the HEI’s information infrastructure, illustrating the proposed use of
an Intelligent Management Centre, based on the State University of Trade and Economics.</p>
      <p>The proposed model for the operation of the HEI’s information infrastructure envisions the
implementation of controlled processes of information flow management and intelligent resource
allocation in accordance with the current needs of users. Within this model, analytical assessments
of resource demand are conducted, followed by their verification and conditional access
provisioning. Resources in the wireless environment are divided into zones with controlled and
guest access.</p>
      <p>At the stage of user identification, a customised resource pool is generated via the access control
system, tailored to the user’s role and functional needs. If the user requires access to additional
information systems, such access is provided without disrupting connection to the main
environment.</p>
      <p>Interaction between information systems is carried out by generating electronic requests
processed by the Intelligent Management Centre that structures the relevant information for
integration into other systems depending on current requests. The information infrastructure
resources are allocated dynamically according to the level of workload and user demands, enabling
flexible database management, the forecasting of peak loads and the implementation of
optimisation techniques, such as data redistribution or compression.</p>
      <p>The system also supports user authentication and subsequent provision of access to both local
networks with assigned privilege levels and virtual networks or environments. In case of remote
work, electronic digital keys can be used for secure connections. This approach ensures maximum
efficiency in the utilisation of information resources under conditions of variable load on individual
segments of the HEI’s infrastructure.</p>
      <p>Figure 3 illustrates the communications, physical connections and architectural changes in the
switching infrastructure resulting from the implementation of the Intelligent Management Centre
that assumes full control over resource distribution, increases the efficiency of their utilisation,
performs analytical data processing and generates recommendations for decision-making within
HEI’s information infrastructure.</p>
      <p>A comparative analysis of the model in Figure 3 reveals significant qualitative improvements in
the management of information flows, allocation of resources among different user categories and
the functioning of the authentication system.</p>
      <p>The Intelligent Management Centre performs a wide range of functions, including: predicting
the outcomes of user authorisation, managing access to computing resources, databases, automated
systems, optimising the load on the HEI’s Internet resources, notifying of system failures, and
detecting unauthorised access attempts. This approach enables rapid analysis of incidents and
implementation of corrective measures by HEI’s information infrastructure administrators.</p>
      <p>The integration of the intelligent system into the structure of the HEI’s information
infrastructure ensures seamless interoperability with all automated subsystems and the
cybersecurity mechanisms. Among its core functions is the management of user administrative
rights, which allows assigning and regulating access types within various automated information
systems based on a predefined user profile, with the possibility of future adjustments.</p>
      <p>Moreover, an important component is the recording of the user’s the physical presence.
Scanning an access card through the access control system registers the individual’s presence in
the general system, which can be further confirmed by video surveillance by matching the user’s
face with a stored photo.</p>
      <p>The system also provides for the possibility of using alternative biometric identification
methods, such as voice recognition or fingerprint scanning. However, the implementation of such
approaches requires significant financial resources and modernisation of the university’s access
control points, which is currently a limiting factor.</p>
      <p>After confirming the user’s physical presence on campus, the intelligent system automatically
provides them with access to all available resources based on the user’s role and permission level.
At the same time, the system is able to adapt to individual habits and needs: it can notify about
new library acquisitions related to their research topics, changes in class schedules, workloads, and
announcements of scientific events and meetings, as well as consider dietary preferences to
optimise food preparation.</p>
      <p>The proposed intelligent system can also automatically record the actual presence of employees
at their workplace, transmitting this data to the financial and economic management systems.
Users may receive reminders about upcoming changes in access rights, professional development
training and other internal updates.</p>
      <p>To ensure comprehensive cybersecurity, we recommend configure, adapt and implement SIEM
systems that continuously collect, process and analyse security events, detect threats in real time,
perform security analysis and management, and conduct incident investigations. Such systems are
particularly valuable because they can be configured and adapted for the entire information
infrastructure of HEI. In cases where cybersecurity experts are lacking, we recommend using a
system that can also be operated by IT specialists who have undergone specific targeted training.
These systems support automatic updates, utilize automated auditing of the HEI’s information
infrastructure, and enable event filtering, security breach detection, alerts, and real-time threat
analysis and management. They also support receiving alerts in response to detected threats or
predicted cyberattacks on institutional information resources.</p>
      <p>Once the intelligent system completes user authentication, it ensures seamless access to
required platforms and services without any additional actions on the part of the user. If necessary,
administrators can modify the level of access individually or collectively, with mandatory
confirmation of changes.</p>
      <p>The cyber defence system performs the function of continuous security monitoring mechanism,
promptly notifying the responsible personnel of any detected threats, attempts of unauthorised
intrusions or attacks, and administrator actions taken to neutralise them, while also forecasting
potential consequences. After the threats are neutralised, the system assesses the time required to
restore the stable operation of the HEI’s information infrastructure, thereby ensuring the
continuity of the educational process.</p>
      <p>Upon verifying the user’s physical presence on campus through authentication systems (e.g.
biometric scanners, RFID tags or mobile applications), the intelligent system automatically
activates a personalised access profile. This mechanism allows immediate use of the HEI’s
information resources—educational platforms, databases, administrative services, laboratories,
libraries or canteens—according to the user’s role (student, teacher, researcher, technician) and
preassigned level of access rights.</p>
      <p>The system performs contextual analysis of the user’s previous actions, service interaction
history, attendance at events, requests to the library or canteen menu, thereby allowing to predict
needs and personalise the environment for each individual. For instance, the nutrition module can
analyse user habits and optimise portion sizes, reducing food waste and costs. The educational
module sends notifications about new library acquisitions according to the user’s academic profile,
and also notifies about changes in the schedule, cancelled sessions, available slots for consultations,
upcoming scientific events, guest lectures, and scholarship opportunities.</p>
      <p>The administrative module of the system provides automatic recording of employees’ working
hours in terms of physical presence, synchronizing this data with accounting and HR modules.
Additionally, the system is capable of informing in advance about planned changes in access rights
to resources, mandatory certifications, trainings or professional development events.</p>
      <p>Automated access rights management provides a transparent and flexible governance model:
when a user’s status changes (for example, a student transfers to another mode of study or an
employee is promoted), the administrator can promptly update the access profile at both the
individual and group levels with instant confirmation of the changes.</p>
      <p>A central component in the operation of the entire system is a cyber security suite, that
performs round-the-clock monitoring of all nodes within the digital infrastructure. It is capable of
detecting anomalies, blocking potential intrusions, logging suspicious activities, including
administrator interference, and promptly inform the responsible personnel. The system
automatically generates forecasts of the damage caused by attacks, provides recommendations for
threat mitigation, estimates the timeframe for restoring the stable functioning of the HEI’s
information infrastructure (i.e., the information infrastructure of the State University of Trade and
Economics) and ensures the uninterrupted continuity of the educational process even in emergency
situations.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>The integration of intelligent systems into the internal infrastructure of a higher education
institution demonstrates significant potential for a qualitative transformation of all processes
related to resource management, education, and user service. Through multi-level authentication,
personalised access to services and systematic data collection, a dynamic digital environment is
created that continuously adapts to the needs of each stakeholder in the educational process,
whether a student, teacher or administrative employee.</p>
      <p>The functionality of the system extends far beyond simple access to informational resources. It
also performs predictive and analytical functions, including the study of user behavioural patterns
to optimise resource utilisation (e.g., campus facilities or library services), automates routine
administrative tasks (attendance tracking, payroll calculation), and improves institutional efficiency
through centralised management of access rights.</p>
      <p>A pivotal component of this infrastructure is the cybersecurity system, which not only ensures
the confidentiality and integrity of data, but also provides the conditions for an uninterrupted
educational process even in the face of cyber threats. Its ability to proactively respond, block
intrusions and predict the consequences of attacks significantly improves the HEI’s digital
resilience. In addition, SIEM systems are adaptive and particularly useful for building effective
cybersecurity framework within higher education institutions.
Overall, the deployment of such an intelligent system within the university environment not only
meets the requirements of the digital transformation of education, but also lays the foundation for
a secure, flexible and efficient educational space of the future, capable of responding to
contemporary challenges with the maximum level of adaptability.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Prus</surname>
          </string-name>
          ,
          <article-title>Mathematical Modeling as a Lens of the Real World</article-title>
          ,
          <source>Physical and Mathematical Education</source>
          <volume>38</volume>
          (
          <issue>4</issue>
          ) (
          <year>2023</year>
          )
          <fpage>56</fpage>
          -
          <lpage>61</lpage>
          . doi:
          <volume>10</volume>
          .31110/
          <fpage>2413</fpage>
          -1571-2023-038-4-008
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>SOPHOS</surname>
          </string-name>
          ,
          <source>The State of Ransomware</source>
          <year>2025</year>
          ,
          <year>2025</year>
          . https://www.sophos.com/en-us/content/stateof-ransomware
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3] BlueVoyant, Cybersecurity in Higher Education,
          <year>2025</year>
          . https://www.bluevoyant.com/ resources/cybersecurity-in
          <string-name>
            <surname>-</surname>
          </string-name>
          higher-education
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>E.</given-names>
            <surname>Zavhorodnya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shestak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kryvoruchko</surname>
          </string-name>
          ,
          <article-title>Digital Risk Management in Higher Education, in: Modern Achievements and Prospects of Socio-Economic Development</article-title>
          ,
          <source>Proceedings of the 2nd Int. Sci. and Practical Conf., Eastern European Center for Scientific Research</source>
          ,
          <year>2025</year>
          ,
          <fpage>138</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shestak</surname>
          </string-name>
          , E. Zavhorodnya,
          <article-title>Protection Principles of HEIs Information Infrastructure</article-title>
          ,
          <source>in: Innovations and Their Impact on the Economy and Society, Proceedings of the Int. Sci. and Practical Conf., Eastern European Center for Scientific Research</source>
          , Sumy, Ukraine,
          <year>2024</year>
          ,
          <fpage>138</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O.</given-names>
            <surname>Burov</surname>
          </string-name>
          , et al.,
          <source>Cybersecurity in Educational Networks, Advances in Intelligent Systems and Computing</source>
          ,
          <volume>359</volume>
          -
          <fpage>364</fpage>
          ,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -39512-4_
          <fpage>56</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of Active Cybersecurity Education in Ukrainian Higher School</article-title>
          , Information Technology for Education,
          <source>Science, and Technics</source>
          , vol.
          <volume>178</volume>
          (
          <year>2023</year>
          )
          <fpage>533</fpage>
          -
          <lpage>551</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -35467-0_
          <fpage>32</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Astafieva</surname>
          </string-name>
          , et al.,
          <article-title>Formation of High School Students' Resistance to Destructive Information Influences</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>87</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Implementation of Active Learning in the Master's Program on Cybersecurity, Advances in Computer Science for Engineering and Education II, vol</article-title>
          .
          <volume>938</volume>
          (
          <year>2020</year>
          )
          <fpage>610</fpage>
          -
          <lpage>624</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -16621-2_
          <fpage>57</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A. A. A.</given-names>
            <surname>El-Latif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Maleh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>El-Affendi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <article-title>Cybersecurity Management in Education Technologies: Risks and Countermeasures for Advancements in E learning</article-title>
          , 1st ed., CRC Press, Boca Raton,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .1201/9781003369042
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Peng</surname>
          </string-name>
          ,
          <article-title>Design of Smart Campus Security Management and Control Platform based on Big Data Technology, in: Educational Innovation and Multimedia Technology</article-title>
          ,
          <source>Proceedings of the 2022 Int. Conf., EIMT</source>
          <year>2022</year>
          , Atlantis Press, Dordrecht, the Netherlands,
          <year>2022</year>
          ,
          <fpage>586</fpage>
          -
          <lpage>595</lpage>
          . doi:
          <volume>10</volume>
          .2991/
          <fpage>978</fpage>
          -94-6463-012-1_
          <fpage>65</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ni</surname>
          </string-name>
          , Y. Zeng,
          <source>Research on Smart Campus System Architecture Design and Data Security Protection Strategy, Frontiers in Computing and Intelligent Systems</source>
          <volume>11</volume>
          (
          <issue>3</issue>
          ) (
          <year>2025</year>
          )
          <fpage>98</fpage>
          -
          <lpage>100</lpage>
          . doi:
          <volume>10</volume>
          .54097/f6sy7t88
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Tahsien</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Karimipour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Spachos</surname>
          </string-name>
          ,
          <article-title>Machine Learning based Solutions for Security of Internet of Things (IoT): A Survey</article-title>
          ,
          <source>J. Netw. Comput. Appl</source>
          .
          <volume>161</volume>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1016/j.jnca.
          <year>2020</year>
          .102630
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Malyukov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kryvoruchko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Desiatko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shestak</surname>
          </string-name>
          ,
          <article-title>Smart City Technology Investment Solution Support System Accounting Multi-factories</article-title>
          ,
          <source>Software Engineering Perspectives in Intelligent Systems</source>
          <volume>1</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -63322-
          <issue>6</issue>
          _
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>T. Domínguez</given-names>
            <surname>Bolaño</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Barral</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. J.</given-names>
            <surname>Escudero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>García Naya</surname>
          </string-name>
          ,
          <article-title>An IoT System for a Smart Campus: Challenges and Solutions Illustrated over Several Real World Use Cases</article-title>
          ,
          <source>Internet of Things</source>
          <volume>25</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .1016/j.iot.
          <year>2024</year>
          .101099
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Application of Big Data Technology in Campus Security Management under the Background of Information Age</article-title>
          ,
          <source>J. Physics: Conf. Series</source>
          <year>1881</year>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -
          <lpage>6596</lpage>
          /
          <year>1881</year>
          /2/022097
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Hamadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Damiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. Y.</given-names>
            <surname>Yeun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Taher</surname>
          </string-name>
          , Explainable Artificial Intelligence Applications in Cyber Security:
          <article-title>State-of-the-Art in Research</article-title>
          , IEEE Access
          <volume>10</volume>
          (
          <year>2022</year>
          )
          <fpage>93104</fpage>
          -
          <lpage>93139</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2022</year>
          .3204051
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kryvoruchko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaminskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Makaiev</surname>
          </string-name>
          ,
          <article-title>Automation of DDoS Attack Investigation in Industrial Control Systems using Bayesian Networks on Python</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems II, 3826</source>
          ,
          <year>2024</year>
          ,
          <fpage>282</fpage>
          -
          <lpage>287</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>O.</given-names>
            <surname>Lytvynov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Filipenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lukashevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Palkova</surname>
          </string-name>
          ,
          <article-title>Cyber Security as a Factor of the Efficiency of Higher Education Institutions</article-title>
          ,
          <source>Propylaeum of Law and Security</source>
          <volume>5</volume>
          (
          <year>2024</year>
          )
          <fpage>15</fpage>
          -
          <lpage>23</lpage>
          . doi:
          <volume>10</volume>
          .32620/pls.
          <year>2024</year>
          .
          <volume>5</volume>
          .
          <fpage>02</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shestack</surname>
          </string-name>
          ,
          <article-title>Modeling of a Single Information Space Higher Education Institution</article-title>
          ,
          <source>Management of Development of Complex Systems</source>
          <volume>49</volume>
          (
          <year>2022</year>
          )
          <fpage>81</fpage>
          -
          <lpage>89</lpage>
          . doi:
          <volume>10</volume>
          .32347/
          <fpage>2412</fpage>
          -
          <lpage>9933</lpage>
          .
          <year>2022</year>
          .
          <volume>49</volume>
          .
          <fpage>81</fpage>
          -
          <lpage>89</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>O.</given-names>
            <surname>Trofymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Loginova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Manakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dubovoi</surname>
          </string-name>
          , Cyberthreats in Higher Education, Electron.
          <source>Professional Sci. J. Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>4</volume>
          (
          <issue>16</issue>
          ) (
          <year>2022</year>
          )
          <fpage>76</fpage>
          -
          <lpage>84</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2022</year>
          .
          <volume>16</volume>
          .7684
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ilyenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ilyenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yakovenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Halych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pavlenko</surname>
          </string-name>
          ,
          <source>Prospects of Integration of Artificial Intelligence in Cybersecurity Systems, Electron. Professional Sci. J. Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>1</volume>
          (
          <issue>25</issue>
          ) (
          <year>2024</year>
          )
          <fpage>318</fpage>
          -
          <lpage>329</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>25</volume>
          .318329
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>T. F.</given-names>
            <surname>Skumin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Stasyshyn</surname>
          </string-name>
          ,
          <article-title>Intelektualna systema kiberzakhystu [Intelligent Cyber Defense System]</article-title>
          ,
          <source>in: Collection of Abstracts Ⅳ Int. Sci. Conf</source>
          .
          <article-title>of Young Scientists and Students “Actual tasks of modern technology”</article-title>
          , TNTU, Ternopil, Ukraine,
          <year>2015</year>
          ,
          <fpage>53</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Kostikova</surname>
          </string-name>
          ,
          <article-title>Modern educational process and cybersecurity</article-title>
          ,
          <source>in: Materials of the AllUkrainian Scientific and Practical Internet-Conf. Modelling and Information Technologies in Science, Technology, Cybersecurity and Education</source>
          , KhNADU, Kharkiv, Ukraine,
          <year>2022</year>
          ,
          <fpage>57</fpage>
          -
          <lpage>59</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.O.</given-names>
            <surname>Dotsenko</surname>
          </string-name>
          ,
          <article-title>Cybersecurity of Participants in the Educational Process in the Context of Distance and Blended Learning, in: Proceeding of All-Ukrainian Scientific and Pedagogical Advanced Training Upravlinnia Naukovymy ta Osvitnimy Proiektamy</article-title>
          , Helvetyka, Odesa, Ukraine,
          <year>2022</year>
          ,
          <fpage>120</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>D.</given-names>
            <surname>Dets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Barduk</surname>
          </string-name>
          ,
          <string-name>
            <surname>O. Syvolap,</surname>
          </string-name>
          <article-title>Cybersecurity in the Field of Open Access: Principles for Protecting Educational</article-title>
          and
          <string-name>
            <given-names>Scientific</given-names>
            <surname>Resources</surname>
          </string-name>
          ,
          <source>Automation of Technological and Business Processes</source>
          <volume>17</volume>
          (
          <issue>1</issue>
          ) (
          <year>2025</year>
          )
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .15673/atbp.v17i1.
          <fpage>3081</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>