TY - GEN
T1 - Developing a cyber counterintelligence maturity model for developing countries
AU - Jaquire, Victor
AU - Von Solms, Sebastian
N1 - Publisher Copyright:
© 2017 IIMC / IST-Africa.
PY - 2017/11/8
Y1 - 2017/11/8
N2 - Experience has shown that developing countries' attempts to forthrightly adopt the frameworks and maturity models of developed nations are generally ineffective. This can be ascribed especially to the unique requirements posed by developing world constraints such as limited resources, infrastructure, technologies, skills and experience. This does not, of course, imply that existing models and frameworks are not useful to the developing countries. To design a cyber counterintelligence maturity model for developing countries it is necessary to discuss the basic concepts of frameworks and maturity models. It is further necessary to identify how they are utilised within developed countries and their general application and utilisation as part of the strategy to protect and secure cyberspace and especially national critical information infrastructure - by both government and the private sector. This, in addition to traditional cybersecurity defensive measures as part of cyber strategy within developing counties.
AB - Experience has shown that developing countries' attempts to forthrightly adopt the frameworks and maturity models of developed nations are generally ineffective. This can be ascribed especially to the unique requirements posed by developing world constraints such as limited resources, infrastructure, technologies, skills and experience. This does not, of course, imply that existing models and frameworks are not useful to the developing countries. To design a cyber counterintelligence maturity model for developing countries it is necessary to discuss the basic concepts of frameworks and maturity models. It is further necessary to identify how they are utilised within developed countries and their general application and utilisation as part of the strategy to protect and secure cyberspace and especially national critical information infrastructure - by both government and the private sector. This, in addition to traditional cybersecurity defensive measures as part of cyber strategy within developing counties.
KW - Cyber counterintelligence
KW - Cyber counterintelligence levels
KW - Cyber counterintelligence maturity
KW - Cyber threat intelligence
KW - Defensive and offensive cybersecurity
UR - http://www.scopus.com/inward/record.url?scp=85043242118&partnerID=8YFLogxK
U2 - 10.23919/ISTAFRICA.2017.8102288
DO - 10.23919/ISTAFRICA.2017.8102288
M3 - Conference contribution
AN - SCOPUS:85043242118
T3 - 2017 IST-Africa Week Conference, IST-Africa 2017
BT - 2017 IST-Africa Week Conference, IST-Africa 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 IST-Africa Week Conference, IST-Africa 2017
Y2 - 31 May 2017 through 2 June 2017
ER -