SlideShare une entreprise Scribd logo
1  sur  21
Cyber Security and Critical Information Infrastructure Protection from a South African  (Developing Countries)  viewpoint The Integritas System to enforce Integrity in     		        Academic Environments Prof Basie Von Solms Academy for Computer Science and Software Engineering University of Johannesburg basievs@uj.ac.za Prof Basie von Solms Mr Jaco du Toit
Why? Why should research about Cyber Security and Critical Information Infrastructure Protection for Africa (and Developing countries in general) concentrate on specific aspects not necessarily relevant to developed countries? Let us investigate a few quotes about ICT and Cyber Security  made about Africa in the last few years:
Africa through the Looking Glass Africa: The Future Home of the World’s Largest Botnet?  ‘IT experts estimate an 80% infection rate on all PCs continent-wide (in Africa), including government computers. It is the cyber equivalent of a pandemic. Few can afford to pay for anti-virus software…... ’
Africa through the Looking Glass ‘Think that Russia and China pose the biggest hacking threats of our time? The virus-plagued computers in Africa could take the entire world economy offline.’
Africa through the Looking Glass ‘Unfortunately, in cyberspace, the whole is only as strong as its weakest link -- and the majority of African countries are downright frail.  The biggest botnet the world has ever known could be lurking there.’
Africa through the Looking Glass ‘As Internet penetration increases across the continent, so does the risk of sophisticated cyber-attacks, threatening African nations’ security, infrastructure, economic growth and citizen services.’
Why is Africa at risk cyber security-wise? ‘Developing countries, such as those in Africa, are particularly vulnerable to cyber-attacks due to a combination of factors, including  ,[object Object]
high levels of computer illiteracy, and
ineffective legislation. These factors all introduce a higher level of cyber security risks and expose the critical infrastructures in such countries to higher levels of risk. ‘
What are the reasons for such quotes and  negativity? 1 Increasing Bandwidth  2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness 4 Ineffective Legislation and Policies 5 Technical cyber security measures 6 Lack of Parliamentary oversight
What are the reasons for such quotes and negativity? 1 Increasing Bandwidth  2 Increasing Use of Wireless technologies and infrastructure ‘Millions of Africans are using mobile phones to pay bills, move cash and buy basic everyday items.  Africa has the fastest-growing mobile phone market in the world and most of the operators are local firms.’.
What are the reasons for such quotes and negativity? 1 Increasing Bandwidth  2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness ‘ as more individuals worldwide gain Internet access through mobile phones,  Cyber criminals will have millions of inexperienced users to dupe with   unsophisticated or well-worn scamming techniques that more savvy users grew  wise to (or fell victim to)  ages ago.’
What are the reasons for such quotes and negativity? 1 Increasing Bandwidth  2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness 4 Ineffective Legislation and Policies 5 Technical cyber security measures 6 Lack of Parliamentary oversight
What value can we add from an African perspective? ,[object Object]
Normal first world security solutions may not work in Africa
By researching these factors in cooperation with international      Partners, real solutions for Africa can be found. ,[object Object],      in other developing countries, and may form good  cooperation       research platforms  between Africa and the rest of the world.
What value can we add from an African perspective? Four examples of models  following from relevant research  and development efforts in South Africa: A Community-Oriented Approach to CIIP in Developing Countries (Computer Security, Advisory and Warning (C-SAW) Team) ,[object Object],2. A New Role for Information Service Providers (ISPs) as Part of       Critical Information Infrastructure Protection and Cyber Security in Africa ,[object Object],      (prototype) 3. South African Academic Cyber Security Alliance (SAACSA) ,[object Object],4. The Centre of Excellence in Cyber Security at the University of Johannesburg
1. Computer Security, Advisory and Warning (C-SAW) TeamTwo-Factor CIIP Development Approach the development of a holistic cyber security structure on two fronts: Top-Down Large entities Direct coordination from CSIRT Bottom-up Smaller entities Interaction with C-SAW teams Two structures are developed concurrently Resulting in a comprehensive final structure
To provide “low-level” coordination Bridge between small role players and the national computer security structure Focused on small role players: Small Academic Entities Primary and Secondary Schools, etc. Small Commercial Entities Small and Medium Enterprises Individuals The “man-on-the-street” All of these role players have: Limited computer facilities Consume “small” amounts of bandwidth Relatively little collective knowledge of computer security threats 15 1. Computer Security, Advisory and Warning (C-SAW) Team
Web Connection Anti Virus Anti Spoofing Web Parental guidance Firewall 2. A New Role for Information Service Providers (ISPs) as Part of       Critical Information Infrastructure Protection and Cyber Security in Africa Thick-security end user ISP
                   ISP Notification Anti spam Anti Spoofing Web Connection Web connection Secured access Anti Virus Web Traffic analysis Filtering Parental guidance Firewall Thick- security ISP

Contenu connexe

Tendances

WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
segughana
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
segughana
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
ftii
 

Tendances (20)

A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital Transformation
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 

Similaire à Cyber security and critical information infrastructure protection from a south african (developing countries)

The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
Zsolt Nemeth
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Moses Kemibaro
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 

Similaire à Cyber security and critical information infrastructure protection from a south african (developing countries) (20)

The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
 
The red book
The red book  The red book
The red book
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Bright future ahead in Cybersecurity
Bright future ahead in CybersecurityBright future ahead in Cybersecurity
Bright future ahead in Cybersecurity
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Plus de Business Finland

Plus de Business Finland (20)

Russia_Business opportunities, presentation by Alexey Zak at Navigate fair 2018
Russia_Business opportunities, presentation by Alexey Zak at Navigate fair 2018Russia_Business opportunities, presentation by Alexey Zak at Navigate fair 2018
Russia_Business opportunities, presentation by Alexey Zak at Navigate fair 2018
 
Norway_Business opportunities, presentation by Jaakko Isotalo at Navigate fai...
Norway_Business opportunities, presentation by Jaakko Isotalo at Navigate fai...Norway_Business opportunities, presentation by Jaakko Isotalo at Navigate fai...
Norway_Business opportunities, presentation by Jaakko Isotalo at Navigate fai...
 
France_Business opportunities_presentation by Marie-Zoe Belon-Laitinen at Nav...
France_Business opportunities_presentation by Marie-Zoe Belon-Laitinen at Nav...France_Business opportunities_presentation by Marie-Zoe Belon-Laitinen at Nav...
France_Business opportunities_presentation by Marie-Zoe Belon-Laitinen at Nav...
 
Innovative Bioproducts Finland
Innovative Bioproducts FinlandInnovative Bioproducts Finland
Innovative Bioproducts Finland
 
Canada_Maritime business opportunities_seminar 2018
Canada_Maritime business opportunities_seminar 2018Canada_Maritime business opportunities_seminar 2018
Canada_Maritime business opportunities_seminar 2018
 
United States Coast Guard icebreaker program_seminar 2018
United States Coast Guard icebreaker program_seminar 2018United States Coast Guard icebreaker program_seminar 2018
United States Coast Guard icebreaker program_seminar 2018
 
China’s key policies and the impacts on maritime industry
China’s key policies and the impacts on maritime industry China’s key policies and the impacts on maritime industry
China’s key policies and the impacts on maritime industry
 
Norway_Maritime and offshore market update 2018
 Norway_Maritime and offshore market update 2018 Norway_Maritime and offshore market update 2018
Norway_Maritime and offshore market update 2018
 
France_Shipbuilding market_seminar 2018
France_Shipbuilding market_seminar 2018France_Shipbuilding market_seminar 2018
France_Shipbuilding market_seminar 2018
 
Russia_Market business opportunities and events 2018
Russia_Market business opportunities and events 2018 Russia_Market business opportunities and events 2018
Russia_Market business opportunities and events 2018
 
German-Finnish maritime co-operation, joint development of next-generation te...
German-Finnish maritime co-operation, joint development of next-generation te...German-Finnish maritime co-operation, joint development of next-generation te...
German-Finnish maritime co-operation, joint development of next-generation te...
 
Challenges and requirements on modern short sea operations in the Baltic Sea ...
Challenges and requirements on modern short sea operations in the Baltic Sea ...Challenges and requirements on modern short sea operations in the Baltic Sea ...
Challenges and requirements on modern short sea operations in the Baltic Sea ...
 
Innovative Bioproducts Finland
Innovative Bioproducts FinlandInnovative Bioproducts Finland
Innovative Bioproducts Finland
 
Invest in Finland Forum 2017
Invest in Finland Forum 2017Invest in Finland Forum 2017
Invest in Finland Forum 2017
 
Team Finland Japan Day 15.5.2017
 Team Finland Japan Day 15.5.2017 Team Finland Japan Day 15.5.2017
Team Finland Japan Day 15.5.2017
 
Iran_Maritime Market snapshot 2017
Iran_Maritime Market snapshot 2017Iran_Maritime Market snapshot 2017
Iran_Maritime Market snapshot 2017
 
Norway_Shipbuilding Market Update, seminar 10.5.2017
Norway_Shipbuilding Market Update, seminar 10.5.2017Norway_Shipbuilding Market Update, seminar 10.5.2017
Norway_Shipbuilding Market Update, seminar 10.5.2017
 
Russia_Business opportunities in Russia_seminar 10.5.2017
Russia_Business opportunities in Russia_seminar 10.5.2017Russia_Business opportunities in Russia_seminar 10.5.2017
Russia_Business opportunities in Russia_seminar 10.5.2017
 
Vietnam_maritime market snapshot, Seminar 10.5.2017
Vietnam_maritime market snapshot, Seminar 10.5.2017Vietnam_maritime market snapshot, Seminar 10.5.2017
Vietnam_maritime market snapshot, Seminar 10.5.2017
 
Germany_New Business Opportunities in German Maritime and Offshore Market_Sem...
Germany_New Business Opportunities in German Maritime and Offshore Market_Sem...Germany_New Business Opportunities in German Maritime and Offshore Market_Sem...
Germany_New Business Opportunities in German Maritime and Offshore Market_Sem...
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Cyber security and critical information infrastructure protection from a south african (developing countries)

  • 1. Cyber Security and Critical Information Infrastructure Protection from a South African (Developing Countries) viewpoint The Integritas System to enforce Integrity in Academic Environments Prof Basie Von Solms Academy for Computer Science and Software Engineering University of Johannesburg basievs@uj.ac.za Prof Basie von Solms Mr Jaco du Toit
  • 2. Why? Why should research about Cyber Security and Critical Information Infrastructure Protection for Africa (and Developing countries in general) concentrate on specific aspects not necessarily relevant to developed countries? Let us investigate a few quotes about ICT and Cyber Security made about Africa in the last few years:
  • 3. Africa through the Looking Glass Africa: The Future Home of the World’s Largest Botnet? ‘IT experts estimate an 80% infection rate on all PCs continent-wide (in Africa), including government computers. It is the cyber equivalent of a pandemic. Few can afford to pay for anti-virus software…... ’
  • 4. Africa through the Looking Glass ‘Think that Russia and China pose the biggest hacking threats of our time? The virus-plagued computers in Africa could take the entire world economy offline.’
  • 5. Africa through the Looking Glass ‘Unfortunately, in cyberspace, the whole is only as strong as its weakest link -- and the majority of African countries are downright frail. The biggest botnet the world has ever known could be lurking there.’
  • 6. Africa through the Looking Glass ‘As Internet penetration increases across the continent, so does the risk of sophisticated cyber-attacks, threatening African nations’ security, infrastructure, economic growth and citizen services.’
  • 7.
  • 8. high levels of computer illiteracy, and
  • 9. ineffective legislation. These factors all introduce a higher level of cyber security risks and expose the critical infrastructures in such countries to higher levels of risk. ‘
  • 10. What are the reasons for such quotes and negativity? 1 Increasing Bandwidth 2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness 4 Ineffective Legislation and Policies 5 Technical cyber security measures 6 Lack of Parliamentary oversight
  • 11. What are the reasons for such quotes and negativity? 1 Increasing Bandwidth 2 Increasing Use of Wireless technologies and infrastructure ‘Millions of Africans are using mobile phones to pay bills, move cash and buy basic everyday items. Africa has the fastest-growing mobile phone market in the world and most of the operators are local firms.’.
  • 12. What are the reasons for such quotes and negativity? 1 Increasing Bandwidth 2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness ‘ as more individuals worldwide gain Internet access through mobile phones, Cyber criminals will have millions of inexperienced users to dupe with unsophisticated or well-worn scamming techniques that more savvy users grew wise to (or fell victim to) ages ago.’
  • 13. What are the reasons for such quotes and negativity? 1 Increasing Bandwidth 2 Increasing Use of Wireless technologies and infrastructure 3 Lack of Cyber security awareness 4 Ineffective Legislation and Policies 5 Technical cyber security measures 6 Lack of Parliamentary oversight
  • 14.
  • 15. Normal first world security solutions may not work in Africa
  • 16.
  • 17.
  • 18. 1. Computer Security, Advisory and Warning (C-SAW) TeamTwo-Factor CIIP Development Approach the development of a holistic cyber security structure on two fronts: Top-Down Large entities Direct coordination from CSIRT Bottom-up Smaller entities Interaction with C-SAW teams Two structures are developed concurrently Resulting in a comprehensive final structure
  • 19. To provide “low-level” coordination Bridge between small role players and the national computer security structure Focused on small role players: Small Academic Entities Primary and Secondary Schools, etc. Small Commercial Entities Small and Medium Enterprises Individuals The “man-on-the-street” All of these role players have: Limited computer facilities Consume “small” amounts of bandwidth Relatively little collective knowledge of computer security threats 15 1. Computer Security, Advisory and Warning (C-SAW) Team
  • 20. Web Connection Anti Virus Anti Spoofing Web Parental guidance Firewall 2. A New Role for Information Service Providers (ISPs) as Part of Critical Information Infrastructure Protection and Cyber Security in Africa Thick-security end user ISP
  • 21. ISP Notification Anti spam Anti Spoofing Web Connection Web connection Secured access Anti Virus Web Traffic analysis Filtering Parental guidance Firewall Thick- security ISP
  • 22.
  • 23. Cyber Security Awareness Workbook for Schools (hard copy)
  • 24. Cyber Security Awareness Board games for Schools
  • 25. DoC
  • 26.
  • 27. Set up a ‘thick-security’ ISP
  • 28.
  • 29. I trust that Finland will become a big partner in some of the projects discussed above.