Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: Cybercrime, cybersecurity, computer emergency response team, computer security incident response team.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.2643673
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2088References:
[1] O. Szumski, “Cybersecurity best practices among Polish students,” Procedia Comput. Sci., vol. 126, pp. 1271–1280, Jan. 2018W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
[2] “Difference Between Cyber Security and Computer Science.” (Online). Available: https://www.ecpi.edu/blog/difference-between-cybersecurity-and-computer-science. (Accessed: 02-Feb-2019). B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
[3] M. Bada and A. Sasse, “Cyber security awareness campaigns: Why do they fail to change behaviour?,” 2014.
[4] “Lesotho Bureau of Statistics.” (Online). Available: http://www.bos.gov.ls/. (Accessed: 15-Feb-2019).
[5] “Lesotho cyber-wellness profile.” (Online). Available: https://www.lca.org.ls/CYBERWELLNESS PROFILE.pdf. (Accessed: 15-Feb-2019).
[6] R. Chandarman and B. Van Niekerk, “Students’ cybersecurity awareness at a private tertiary educational institution,” Afr. J. Inf. Commun., vol. 2017, no. 20, pp. 133–155, 2017.
[7] M. J. Z. de Barros and H. Lazarek, “A Cyber Safety Model for Schools in Mozambique,” 2018.
[8] E. Sutherland, “Digital Privacy in Africa: Cybersecurity, Data Protection & Surveillance,” Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 3201310, Jun. 2018.
[9] “Investigating the efficacy of cybersecurity awareness training programs -ProQuest.” (Online). Available: https://search.proquest.com/openview/96d92f6796e45364234f187e94b401d8/1?pq-origsite=gscholar&cbl=18750&diss=y. (Accessed: 15-Feb-2019).
[10] S. Kouttis, “Improving security knowledge, skills and safety,” Comput. Fraud Secur., vol. 2016, no. 4, pp. 12–14, Apr. 2016.
[11] N. Ben-Asher and C. Gonzalez, “Effects of cyber security knowledge on attack detection,” Comput. Hum. Behav., vol. 48, pp. 51–61, Jul. 2015.
[12] C. McIntosh, “Cybersecurity: who will provide protection?,” Comput. Fraud Secur., vol. 2015, no. 12, pp. 19–20, Dec. 2015.
[13] J. Srinivas, A. K. Das, and N. Kumar, “Government regulations in cyber security: Framework, standards and recommendations,” Future Gener. Comput. Syst., Oct. 2018.
[14] “ICT Research,” (Online). Available: www.lca.org.ls/publications. (Accessed: 21-Feb-2019).
[15] “Lack of cyber security awareness cause of persistent online scams – Minister.” (Online). Available: http://www.ghanaweb.com/GhanaHomePage/NewsArchive/Lack-of-cybersecurity-awareness-cause-of-persistent-online-scams-Minister-689408?channel=D1. (Accessed: 24-Feb-2019).
[16] S. Kabanda, M. Tanner, and C. Kent, “Exploring SME cybersecurity practices in developing countries,” J. Organ. Comput. Electron. Commer., vol. 28, no. 3, pp. 269–282, 2018.
[17] “Lesotho Internet Users.” (Online). Available: http://www.internetlivestats.com/internet-users/lesotho/. (Accessed: 24-Feb-2019).
[18] “Cyber security under spotlight,” Lesotho Times, 07-Apr-2017. (Online). Available: lestimes.com/cybersecurity-under-spotlight/. (Accessed: 24-Feb-2019).
[19] J. C. Jansen van Vuuren, M. Grobler, L. Leenen, and J. Phahlamohlaka, “Proposed Model for a Cybersecurity Centre of Innovation for South Africa,” 2014, pp. 293–306.
[20] “Africa CyberSecurity Report 2016.” (Online). Available: www.serianu.com/downloads/AfricaCyberSecurityReport2016.pdf. (Accessed: 24-Feb-2019).
[21] B. Pretorius and B. van Niekerk, “Cybersecurity for ICS/SCADA: A South African Perspective,” Int. J. Cyber Warf. Terror. IJCWT, vol. 6, no. 3, pp. 1–16, Jul. 2016.
[22] “What Role Should ISPs Play in Cybersecurity?,” Dark Reading. (Online). Available: https://www.darkreading.com/endpoint/what-role-should-isps-play-in-cybersecurity/a/d-id/1328716. (Accessed: 24-Feb-2019).
[23] L. P. Muller, “Cyber Security Capacity Building in Developing Countries,” p. 4, 2015.
[24] R. Sabillon, V. Cavaller, and J. Cano, “National Cyber Security Strategies: Global Trends in Cyberspace,” vol. 5, no. 5, p. 15, 2016.
[25] M. D. Mahlobo, “National Cybersecurity Policy Framework,” p. 30, 2015.
[26] G. Killcrece. “Steps for Creating National CSIRTs”. Coordination Center, 2018 (Online). (Available: www.cert.org/archives/pdf/NationalCSIRTs.pdf). (Accessed: 22-Feb-2019).