TY - GEN
T1 - A best practice strategy framework for developing countries to secure cyberspace
AU - Jaquire, Victor
AU - Von Solms, Basie
PY - 2015
Y1 - 2015
N2 - The objective of this paper, flowing from an active post-graduates research program, is to provide a best practice strategy framework for developing countries to secure cyberspace, taking cognisance of the realities and constraints within a developing milieu. Cybersecurity policies and related strategies are required for developing countries in order to effectively safeguard against cyber related threats (the same as for developed countries). These policies and strategies for developing countries will differ from those of developed countries due to the unique realities within a developing world. Africa in specific is presently seen as a hotbed for cybercrime, and one of the reasons is that many African countries do not have a proper framework, policies and procedures to properly protect cyberspace. Experience has also shown that a pure adoption by developing countries of the cyber frameworks of developed nations will not always be effective, especially due to the unique requirements and realities within developing worlds, such as limited resources, infrastructure, technologies, skills and experience. The approach taken for the research program, and discussed in this paper, is based on a comprehensive literature study on several existing cybersecurity policies and strategies from both developed and developing countries. From this the drivers / elements for national cybersecurity policies and strategies were identified. These drivers were than adapted to specifically relate to the requirements of developing countries, and then, utilising the identified and adapted drivers, our best practice strategy framework for developing countries to secure their cyberspace was developed. This document will be very useful for those African countries venturing into defining relevant policies and procedures.
AB - The objective of this paper, flowing from an active post-graduates research program, is to provide a best practice strategy framework for developing countries to secure cyberspace, taking cognisance of the realities and constraints within a developing milieu. Cybersecurity policies and related strategies are required for developing countries in order to effectively safeguard against cyber related threats (the same as for developed countries). These policies and strategies for developing countries will differ from those of developed countries due to the unique realities within a developing world. Africa in specific is presently seen as a hotbed for cybercrime, and one of the reasons is that many African countries do not have a proper framework, policies and procedures to properly protect cyberspace. Experience has also shown that a pure adoption by developing countries of the cyber frameworks of developed nations will not always be effective, especially due to the unique requirements and realities within developing worlds, such as limited resources, infrastructure, technologies, skills and experience. The approach taken for the research program, and discussed in this paper, is based on a comprehensive literature study on several existing cybersecurity policies and strategies from both developed and developing countries. From this the drivers / elements for national cybersecurity policies and strategies were identified. These drivers were than adapted to specifically relate to the requirements of developing countries, and then, utilising the identified and adapted drivers, our best practice strategy framework for developing countries to secure their cyberspace was developed. This document will be very useful for those African countries venturing into defining relevant policies and procedures.
KW - Best practice
KW - Cybersecurity
KW - Cyberspace
KW - Developing countries
KW - Policy
KW - Strategy framework
UR - http://www.scopus.com/inward/record.url?scp=84969134545&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84969134545
T3 - Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
SP - 472
EP - 480
BT - Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
A2 - Zaaiman, Jannie
A2 - Leenen, Louise
PB - Academic Conferences Limited
T2 - 10th International Conference on Cyber Warfare and Security, ICCWS 2015
Y2 - 24 March 2015 through 25 March 2015
ER -