WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/10010176,
	  title     = {Cybersecurity Protection Structures: The Case of Lesotho},
	  author    = {N. N. Mosola and  K. F. Moeketsi and  R. Sehobai and  N. Pule},
	  country	= {},
	  institution	= {},
	  abstract     = {The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {13},
	  number    = {3},
	  year      = {2019},
	  pages     = {158 - 163},
	  ee        = {https://publications.waset.org/pdf/10010176},
	  url   	= {https://publications.waset.org/vol/147},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 147, 2019},
	}