D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow,
E., Zanella-Béguelin, S., and Zimmermann, P. (2018).
Imperfect forward secrecy. Communications of the
ACM, 62(1):106–114.
Akiyama, M., Yagi, T., Yada, T., Mori, T., and
Kadobayashi, Y. (2017). Analyzing the ecosystem of
malicious URL redirection through longitudinal ob-
servation from honeypots. Computers and Security,
69:155–173.
Barker, E. and Roginsky, A. (2019). Transitioning the use of
cryptographic algorithms and key lengths. Technical
report, National Institute of Standards and Technol-
ogy, Gaithersburg, MD.
Barreto, J., Almeida, H., and Pinto, P. (2023). An overview
of https and dnssec services adoption in higher educa-
tion institutions in brazil. In 2023 25th International
Conference on Advanced Communication Technology
(ICACT), pages 180–185.
Berners-Lee, T. (1991). The HTTP Protocol As Imple-
mented In W3.
Bezjak, S., Clyburne-Sherin, A., Conzett, P., Fernandes,
P., Görögh, E., Helbig, K., Kramer, B., Labastida,
I., Niemeyer, K., Psomopoulos, F., Ross-Hellauer, T.,
Schneider, R., Tennant, J., Verbakel, E., Brinken, H.,
and Heller, L. (2018). Open Science Training Hand-
book. Zenodo.
Buchanan, W. J., Helme, S., and Woodward, A. (2018).
Analysis of the adoption of security headers in HTTP.
IET Information Security, 12(2):118–126.
Chung, T., Van Rijswijk-Deij, R., Chandrasekaran, B.,
Choffnes, D., Levin, D., Maggs, B. M., Mislove, A.,
and Wilson, C. (2017). A longitudinal, end-to-end
view of the dnssec ecosystem. In Proceedings of
the 26th USENIX Conference on Security Symposium,
SEC’17, page 1307–1322, USA. USENIX Associa-
tion.
Emsisoft Malware Lab (2020). The State of Ran-
somware in the US: Report and Statistics 2020.
https://blog.emsisoft.com/en/37314/the-state-of-
ransomware-in-the-us-report-and-statistics-2020/.
Emsisoft Malware Lab (2021). The State of Ran-
somware in the US: Report and Statistics 2021
. https://blog.emsisoft.com/en/40813/the-state-of-
ransomware-in-the-us-report-and-statistics-2021/.
Felgueiras, N. and Pinto, P. (2022). An Overview of the
Status of DNS and HTTP Security Services in Higher
Education Institutions in Portugal. In Paiva, S., Li, X.,
Lopes, S. I., Gupta, N., Rawat, D. B., Patel, A., and
Karimi, H. R., editors, Science and Technologies for
Smart Cities, pages 457–469, Cham. Springer Inter-
national Publishing.
Gobi, M., Sridevi, R., and Rahini, R. (2015). A Compar-
ative Study on the Performance and the Security of
RSA and ECC Algorithm. Special Issue Published in
Int. Jnl. Of Advanced Networking and Applications.
Grenfeldt, M., Olofsson, A., Engström, V., and Lager-
ström, R. (2021). Attacking Websites Using HTTP
Request Smuggling: Empirical Testing of Servers and
Proxies. In 2021 IEEE 25th International Enterprise
Distributed Object Computing Conference (EDOC),
pages 173–181.
Hao Yang, Osterweil, E., Massey, D., Songwu Lu, and Lixia
Zhang (2011). Deploying Cryptography in Internet-
Scale Systems: A Case Study on DNSSEC. IEEE
Transactions on Dependable and Secure Computing,
8(5):656–669.
Jeitner, P. and Shulman, H. (2021). Injection attacks
reloaded: Tunnelling malicious payloads over DNS.
In 30th USENIX Security Symposium (USENIX Secu-
rity 21), pages 3165–3182. USENIX Association.
Junior, J., Rutecka, P., and Pinto, P. (2023).
Higher education institutions in poland dataset.
https://doi.org/10.5281/zenodo.8333574.
Lavrenovs, A. and Melon, F. J. R. (2018). HTTP security
headers analysis of top one million websites. In 2018
10th International Conference on Cyber Conflict (Cy-
Con), pages 345–370. IEEE.
Lian, W., Rescorla, E., Shacham, H., and Savage, S. (2013).
Measuring the Practical Impact of DNSSEC Deploy-
ment. In Proceedings of the 22nd USENIX Conference
on Security, SEC’13, pages 573–588, USA. USENIX
Association.
Mahto, D. and Kumar Yadav, D. (2017). RSA and ECC: A
Comparative Analysis. International Journal of Ap-
plied Engineering Research, 12:9053–9061.
Man, K., Zhou, X., and Qian, Z. (2021). DNS Cache Poi-
soning Attack: Resurrections with Side Channels. In
Proceedings of the 2021 ACM SIGSAC Conference
on Computer and Communications Security, pages
3400–3414, New York, NY, USA. ACM.
Nir, Y., Josefsson, S., and Pegourie-Gonnard, M. (2018).
Elliptic Curve Cryptography (ECC) Cipher Suites for
Transport Layer Security (TLS) Versions 1.2 and Ear-
lier. Technical report, IETF.
Osterweil, E., Ryan, M., Massey, D., and Zhang, L. (2008).
Quantifying the operational status of the DNSSEC de-
ployment. In Proceedings of the 8th ACM SIGCOMM
conference on Internet measurement, IMC ’08, pages
231–242, New York, NY, USA. ACM.
Poland (2022a). List of public universities supervised by the
minister responsible for higher education - public aca-
demic universities. https://www.gov.pl/web/edukacja-
i-nauka/wykaz-uczelni-publicznych-nadzorowanych-
przez-ministra-wlasciwego-ds-szkolnictwa-
wyzszego-publiczne-uczelnie-akademickie.
Poland (2022b). Rad-on-system - data of institu-
tions of higher education and science system.
https://radon.nauka.gov.pl/dane/instytucje-systemu-
szkolnictwa-wyzszego-i-nauki.
Randall, J., Kaliski, B., Brainard, J., and Turner, S. (2010).
Use of the RSA-KEM Key Transport Algorithm in the
Cryptographic Message Syntax (CMS). Technical re-
port, IETF.
Rescorla, E. (2000). HTTP Over TLS. RFC 2818.
Science in Poland (2021). Cyber attacks on Polish uni-
versities some of the worst in the world, says report.
https://scienceinpoland.pl/en/news/news%2C89064%2
Ccyber-attacks-polish-universities-some-worst-
world-says-report.html.
Siewert, H., Kretschmer, M., Niemietz, M., and So-
morovsky, J. (2022). On the Security of Pars-
The Status and Management of Web-Related Security at Higher Education Institutions in Poland
797