Developing a cyber counterintelligence maturity model for developing countries

Victor Jaquire, Sebastian Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

Experience has shown that developing countries' attempts to forthrightly adopt the frameworks and maturity models of developed nations are generally ineffective. This can be ascribed especially to the unique requirements posed by developing world constraints such as limited resources, infrastructure, technologies, skills and experience. This does not, of course, imply that existing models and frameworks are not useful to the developing countries. To design a cyber counterintelligence maturity model for developing countries it is necessary to discuss the basic concepts of frameworks and maturity models. It is further necessary to identify how they are utilised within developed countries and their general application and utilisation as part of the strategy to protect and secure cyberspace and especially national critical information infrastructure - by both government and the private sector. This, in addition to traditional cybersecurity defensive measures as part of cyber strategy within developing counties.

Original languageEnglish
Title of host publication2017 IST-Africa Week Conference, IST-Africa 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781905824571
DOIs
Publication statusPublished - 8 Nov 2017
Event2017 IST-Africa Week Conference, IST-Africa 2017 - Windhoek, Namibia
Duration: 31 May 20172 Jun 2017

Publication series

Name2017 IST-Africa Week Conference, IST-Africa 2017

Conference

Conference2017 IST-Africa Week Conference, IST-Africa 2017
Country/TerritoryNamibia
CityWindhoek
Period31/05/172/06/17

Keywords

  • Cyber counterintelligence
  • Cyber counterintelligence levels
  • Cyber counterintelligence maturity
  • Cyber threat intelligence
  • Defensive and offensive cybersecurity

ASJC Scopus subject areas

  • Conservation
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems and Management
  • Development
  • Education
  • Geography, Planning and Development
  • Cultural Studies

Fingerprint

Dive into the research topics of 'Developing a cyber counterintelligence maturity model for developing countries'. Together they form a unique fingerprint.

Cite this