2017 Conference on Information Communication Technology and Society (ICTAS) 2017
DOI: 10.1109/ictas.2017.7920657
|View full text |Cite
|
Sign up to set email alerts
|

Developing a cyber threat intelligence sharing platform for South African organisations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 1 publication
0
10
0
1
Order By: Relevance
“…Perhaps when the CIPA regulations are gazetted, the roles, responsibilities, and accountability of different parties will be defined to also include cyber resilience. As argued by Mutemwa [66], a good cybersecurity strategy should also include cyber resilience in addition to cyber defence policies and capabilities. A cyber resilience strategy helps shift from a retroactive to a more proactive approach [95].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Perhaps when the CIPA regulations are gazetted, the roles, responsibilities, and accountability of different parties will be defined to also include cyber resilience. As argued by Mutemwa [66], a good cybersecurity strategy should also include cyber resilience in addition to cyber defence policies and capabilities. A cyber resilience strategy helps shift from a retroactive to a more proactive approach [95].…”
Section: Discussionmentioning
confidence: 99%
“…The domestic stakeholders relevant to the national cybersecurity endeavours as reviewed in Appendix A are as follows: The key national and domestic stakeholders as defined in the NCPF can be represented, as shown in Figure 1. As shown in Figure 1 and delineated in the NCPF, the key organs of state that play a critical role in the implementation of the cybersecurity strategy [65] are dominated by the Justice, Crime Prevention and Security (JCPS) cluster [66]. According to the Government of South Africa [67] All other organs of state, including but not limited to those listed above, are required to align their cybersecurity and Information and Communications Technology (ICT) policies and practices with the NCPF [65].…”
Section: National Cybersecurity Stakeholdersmentioning
confidence: 99%
“…[1] Cyber crime atau kejahatan siber marak terjadi terutama pada website yang di kelola oleh Pemerintah [2] (kementrian, lembaga maupun pemerintah daerah/kota) termasuk website milik Pemerintah DKI Jakarta, adapun aksi pegerusakan ataupun Hacking biasanya dikarenakan ketidak puasan sekelompok golongan, uji coba kerentanan sistem keamanan atau bisa juga dikarenakan isu politik yang menimbulkan marak terjadi kejahatan siber (Cyber Crime) dan web tidak aman. [3] Dengan belum adanya pengelolaan pusat layanan keamanan informasi (PUSDALOPS KAMI) seperti Security Awareness, pencegahan, konsultasi, mitigasi dan layanan kemanan informasi lainnya.Serangan dunia maya terus meningkat komplektifitas dan frekuensi berbanding lurus dengan jumlah pertumbuhan perangkat teknologi informasi dan komunikasi yang terhubung ke internet berdampak negatif [4] pada masyarakat, pemerintah dan bisnis sangat merugikan terkait keamanan dan pertahanan nasional khususnya roda pemerintahan daerah provinsi DKI Jakarta. Badan Standarisasi Nasional menetapkan SNI ISO/IEC 71: sebagai standar nasional dalam teknologi dan keamanan informasi serta manajemen keamanan informasi Badan Siber dan Sandi Negara (BSSN) mengeluarkan aplikasi yang digunakan sebagai alat bantu untuk menganalisa dan mengevaluasi tingkat kesiapan penerapan SNI ISO/IEC 27001:2013 yaitu indeks KAMI (Keamanan Informasi).…”
Section: Pendahuluanunclassified
“…However, such tools are expensive and only a limited number of organizations can afford to invest in such tools; often smaller organizations are not able to participate in the threat intelligence market [9]. Time and effort to implement are some of the leading challenges experienced with this function [2,12,18].…”
Section: Challenges For the Adoption Of A Cti Function Adoptionmentioning
confidence: 99%