Major security incidents since 2014: An African perspective

Renier Van Heerden, Sune Von Solms, Johannes Vorster

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. Many of the large information security attacks of the last decade can be seen as an attack on 'foreign' systems or individuals when viewed from an African perspective, with no direct impact on an individual in Africa. However, information security experts in Africa states that although some of these attacks might not have had a direct impact of the African individual, but never the less should not be ignored as it does indirectly influence the African individual. The experts state that even if the individuals or businesses are not directly influenced by an attack, it should not be ignored as similar attacks might influence them in the future. They emphasise that these attacks should improve their cybersecurity awareness and behaviour, in order to prevent similar attacks from impacting them.

Original languageEnglish
Title of host publication2018 IST-Africa Week Conference, IST-Africa 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781905824601
Publication statusPublished - 20 Jul 2018
Event2018 IST-Africa Week Conference, IST-Africa 2018 - Gaborone, Botswana
Duration: 9 May 201811 May 2018

Publication series

Name2018 IST-Africa Week Conference, IST-Africa 2018

Conference

Conference2018 IST-Africa Week Conference, IST-Africa 2018
Country/TerritoryBotswana
CityGaborone
Period9/05/1811/05/18

Keywords

  • Africa
  • Information security
  • cyber-attacks

ASJC Scopus subject areas

  • Education
  • Computer Science Applications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Major security incidents since 2014: An African perspective'. Together they form a unique fingerprint.

Cite this