Trustworthy ICT and Cyber Security Research Adding value from an African perspective



Similar documents
Towards a more secure Cyber Space for South Africa

Journal of Information Assurance & Cybersecurity

Research Article A Framework for Cyber Security in Africa. E Kritzinger 1 and SH von Solms 2

ACEIE, CSP & NSTF workshop on digital wellness in SA. Jansie Niehaus Exec Director, NSTF 21 Aug 2015

Cyber Security Governance in Open Distance Learning

Information Security Summit 2005

Cybercrime: a complex problem requiring a mul4- faceted response. 26 March 2014

Cybersecurity Initiatives

Promoting Network Security (A Service Provider Perspective)

NEW ZEALAND S CYBER SECURITY STRATEGY

Network Security and the Small Business

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cybersecurity A Clear and Present Danger

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Cyber Crime: You Are the Target

Opportunities in Indian IT Security Market

TLP WHITE. Denial of service attacks: what you need to know

Top tips for improved network security

Patrick Gray Principal Security Strategist DATA SECURITY CHALLENGES IN THE ALL TOO PUBLIC AND NOT SO PRIVATE SECTORS

Proactive security IT body armor against business attacks WHITE PAPER

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

POLICIES TO MITIGATE CYBER RISK

Promoting a cyber security culture and demand compliance with minimum security standards;

Are You A Sitting Duck?

How To Get A Cloud Service For A Small Business

Top Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7

Internet threats: steps to security for your small business

Cybersecurity Academies roundtable Tina Allison

Policies and Practices on Network Security of MIIT

Cyber Security Education & Awareness. Guide for User s

Computer Security Literacy

2012 NORTON CYBERCRIME REPORT

Emerging Security Technological Threats

Global IT Security Risks

Kaspersky Lab. Contents

Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents

Cyber security Country Experience: Establishment of Information Security Projects.

S. ll IN THE SENATE OF THE UNITED STATES

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Building a Business Case:

Before. The House Committee on Small Business Subcommittee on Regulatory Reform and Oversight. March 16, 2006

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Practical guide for secure Christmas shopping. Navid

How To Protect Yourself From A Dos/Ddos Attack

Security - A Holistic Approach to SMBs

Seven Practices for Computer Security

Malware & Botnets. Botnets

Online Cash Manager Security Guide

A Cyber Security Integrator s perspective and approach

Guide. is vital - but it s not your business!

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

EY Cyber Security Hacktics Center of Excellence

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

Role of IT in Educational Institutes

7 PRACTICES FOR SAFER COMPUTING

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

G DATA MOBILE MALWARE REPORT

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Types of cyber-attacks. And how to prevent them

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

2012 Bit9 Cyber Security Research Report

Managing Web Security in an Increasingly Challenging Threat Landscape

Payment Fraud Trends

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal November 2009

3 day Workshop on Cyber Security & Ethical Hacking

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

OIG Fraud Alert Phishing

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

CYBERSPACE SECURITY CONTINUUM

Small businesses: What you need to know about cyber security

Data Loss Prevention in the Enterprise

Developments in cybercrime and cybersecurity

Security for NG9-1-1 SYSTEMS

Voice Over IP Technology. Zlatko Jovanovic. International Academy of Design and Technology

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Cyber Security Survey

INSIDE. Mitigating Online Fraud: Customer Confidence, Brand Protection, and Loss Minimization. Symantec Online Fraud Management

CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC. October Sponsored by:

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Transcription:

Trustworthy ICT and Cyber Security Research Adding value from an African perspective Prof Basie Von Solms Academy for Computer Science and Software Engineering University of Johannesburg basievs@uj.ac.za The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit

Why? Why should research about Trustworthy ICT and Cyber Security originating from Africa add value and be useful to the rest of the world? What value can research from Africa add? Let us investigate a few quotes about ICT and Cyber Security made about Africa in the last few years:

Africa through the Looking Glass Africa: The Future Home of the World s Largest Botnet? IT experts estimate an 80% infection rate on all PCs continent-wide (in Africa), including government computers. It is the cyber equivalent of a pandemic. Few can afford to pay for antivirus software...

Africa through the Looking Glass Think that Russia and China pose the biggest hacking threats of our time? The virus-plagued computers in Africa could take the entire world economy offline.

Africa through the Looking Glass Unfortunately, in cyberspace, the whole is only as strong as its weakest link -- and the majority of African countries are downright frail. The biggest botnet the world has ever known could be lurking there.

Africa through the Looking Glass As Internet penetration increases across the continent, so does the risk of sophisticated cyber-attacks, threatening African nations security, infrastructure, economic growth and citizen services.

Why is Africa at risk cyber security-wise? Developing countries, such as those in Africa, are particularly vulnerable to cyber-attacks due to a combination of factors, including increasing Internet penetration rates, high levels of computer illiteracy, and ineffective legislation. These factors all introduce a higher level of cyber security risks and expose the critical infrastructures in such countries to higher levels of risk.

What are the reasons for such quotes and negativity? 1 Increasing Bandwidth 2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness 4 Ineffective Legislation and Policies 5 Technical cyber security measures 6 Lack of Parliamentary oversight

What are the reasons for such quotes and negativity? 1 Increasing Bandwidth 2 Increasing Use of Wireless technologies and infrastructure Millions of Africans are using mobile phones to pay bills, move cash and buy basic everyday items. Africa has the fastest-growing mobile phone market in the world and most of the operators are local firms..

What are the reasons for such quotes and negativity? 1 Increasing Bandwidth 2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness as more individuals worldwide gain Internet access through mobile phones, Cyber criminals will have millions of inexperienced users to dupe with unsophisticated or well-worn scamming techniques that more savvy users grew wise to (or fell victim to) ages ago.

What are the reasons for such quotes and negativity? 1 Increasing Bandwidth 2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness 4 Ineffective Legislation and Policies 5 Technical cyber security measures 6 Lack of Parliamentary oversight

What value can we add from an African perspective? Any research ignoring these factors, will not solve Africa s problems. Normal first world security solutions may not work in Africa By researching these factors in cooperation with international Partners, real solutions for Africa can be found. Such solutions, originating from Africa, can help to address similar problems in other developing countries, and may form good cooperation research platforms between Africa and the rest of the world.

What value can we add from an African perspective? Three examples of models following from relevant research in South Africa: 1. A Community-Oriented Approach to CIIP in Developing Countries Bottom-up approach vs Top down approach 2. A New Role for Information Service Providers (ISPs) as Part of Critical Information Infrastructure Protection and Cyber Security in Africa From Security-thick users to Security-thin users (prototype) 3. South African Academic Cyber Security Alliance (SAACSA) UJ, NMMU, UNISA

2. A New Role for Information Service Providers (ISPs) as Part of Critical Information Infrastructure Protection and Cyber Security in Africa Thick-security end user Web Connection Anti Virus ISP Anti Spoofing Parental guidance Firewall Web

Thin-security end user ISP Notification Anti spam Web Connection Web connectio n Anti Spoofing Anti Virus Secured access Web Traffic analysis Filtering Parental guidance Firewall

3. South African Academic Cyber Security Alliance (SAACSA) National Cyber Security Awareness Day Cyber Security Awareness Workbook for Schools (hard copy) Cyber Security Awareness Board games for Schools DoC

As far as Trustworthy ICT and Cyber Security Research is concerned We can and want to add value

Thanks