National Cyber Security in South Africa: A Letter to the Minister of Cyber Security

被引:0
|
作者
von Solms, Rossouw [1 ]
von Solms, Basie [2 ]
机构
[1] Nelson Mandela Metropolitan Univ, Port Elizabeth, South Africa
[2] Univ Johannesburg, Johannesburg, South Africa
关键词
cyber security; cyber safety; cyber security policy; cyber security strategy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
South Africa, like the rest of the world, has become ever more reliant on cyberspace to govern and conduct business, but it is also increasingly exposed to cyber related threats. In 2010, the South African government released the Draft National Cyber Security Policy Framework. This draft policy acknowledged that "South Africa does not have a coordinated approach in dealing with cyber security" and that the "aim of this Policy is to establish an environment that will ensure confidence and trust in the secure use of ICTs". In March 2012 the South African cabinet approved the Policy, but to date absolutely no progress towards the implementation thereof is apparent to the public of South Africa. Meanwhile numerous other countries have published and implemented their National Cyber Security Strategies years ago. In fact, some countries, like the United Kingdom, have filed progress reports regarding the progress made in the implementation of their respective cyber security strategies. Thus, these countries are progressing towards securing cyberspace that is crucial to modern-day critical infrastructure protection, economy and society. South Africa needs to urgently act in this regard. South Africa cannot continue to drag feet in securing cyberspace in South Africa. For this reason, the objective of this position paper is to motivate the criticality of the situation and, in the conclusion of the paper, to draft a letter addressed to the South African Minister for Cyber Security (whom we know does not exist, but hope that he/she will exist in the near future) to escalate and prioritize the agenda of a National Cyber Security Strategy as a matter of urgency.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
  • [31] Cyber security readiness in the South Australian Government
    Borgman, Brenton
    Mubarak, Sameera
    Choo, Kim-Kwang Raymond
    [J]. COMPUTER STANDARDS & INTERFACES, 2015, 37 : 1 - 8
  • [32] Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa
    Lejaka, Tebogo Kesetse
    Da Veiga, Adele
    Loock, Marianne
    [J]. 2019 CONFERENCE ON INFORMATION COMMUNICATIONS TECHNOLOGY AND SOCIETY (ICTAS), 2019,
  • [33] Good Governance and Virtue in South Africa's Cyber Security Policy Implementation
    Burmeister, Oliver
    Phahlamohlaka, Jackie
    Al-Saggaf, Yeslam
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2015, 5 (01) : 19 - 29
  • [34] The Cyber-Security State of our Nation: A Critique of South Africa's Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure
    Mohideen, Feroze
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 235 - 243
  • [35] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [36] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    [J]. INTERNET POLICY REVIEW, 2018, 7 (02):
  • [37] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [38] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    [J]. CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [39] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    [J]. COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [40] EU AND CYBER SECURITY
    Onescu, Dragos Ionut
    [J]. ELEARNING VISION 2020!, VOL I, 2016, : 436 - 441