dc.contributor.author |
Swart, I
|
|
dc.contributor.author |
Irwin, B
|
|
dc.contributor.author |
Grobler, M
|
|
dc.date.accessioned |
2015-01-14T05:58:12Z |
|
dc.date.available |
2015-01-14T05:58:12Z |
|
dc.date.issued |
2014-08 |
|
dc.identifier.citation |
Swart, I, Irwin, B and Grobler, M. 2014. Towards a platform to visualize the state of South Africa's information security. In: ISSA 2014: 13th International Information Security for South Africa Conference: Workshop on ICT Uses in Warfare and the Safeguarding of Peace, Sandton, South Africa, 13-15 August 2014 |
en_US |
dc.identifier.uri |
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6950511
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/7840
|
|
dc.description |
ISSA 2014: 13th International Information Security for South Africa Conference: Workshop on ICT Uses in Warfare and the Safeguarding of Peace, Sandton, South Africa, 13-15 August 2014. Post print attached |
en_US |
dc.description.abstract |
Attacks via the Internet infrastructure is increasingly becoming a daily occurrence and South Africa is no exception. In response, certain governments have published strategies pertaining to information security on a national level. These policies aim to ensure that critical infrastructure is protected, and that there is a move towards a greater state of information security readiness. This is also the case for South Africa where a variety of policy initiatives have started to gain momentum. While establishing strategy and policy is essential, ensuring its implementation is often difficult and dependent on the availability of resources. This is even more so in the case of information security since virtually all standardized security improvement processes start off with specifying that a proper inventory is required of all hardware, software, people and processes. While this may be possible to achieve at an organizational level, it is far more challenging on a national level. In this paper, the authors examine the possibility of making use of available data sources to achieve inventory of infrastructure on a national level and to visualize the state of a country’s information security in at least a partial manner. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE Xplore |
en_US |
dc.relation.ispartofseries |
Workflow;13976 |
|
dc.subject |
National infrastructure |
en_US |
dc.subject |
Information security readiness |
en_US |
dc.subject |
Visualisation |
en_US |
dc.subject |
Big data |
en_US |
dc.subject |
ISO 27001-2 |
en_US |
dc.subject |
Security metrics |
en_US |
dc.title |
Towards a platform to visualize the state of South Africa's information security |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Swart, I., Irwin, B., & Grobler, M. (2014). Towards a platform to visualize the state of South Africa's information security. IEEE Xplore. http://hdl.handle.net/10204/7840 |
en_ZA |
dc.identifier.chicagocitation |
Swart, I, B Irwin, and M Grobler. "Towards a platform to visualize the state of South Africa's information security." (2014): http://hdl.handle.net/10204/7840 |
en_ZA |
dc.identifier.vancouvercitation |
Swart I, Irwin B, Grobler M, Towards a platform to visualize the state of South Africa's information security; IEEE Xplore; 2014. http://hdl.handle.net/10204/7840 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Swart, I
AU - Irwin, B
AU - Grobler, M
AB - Attacks via the Internet infrastructure is increasingly becoming a daily occurrence and South Africa is no exception. In response, certain governments have published strategies pertaining to information security on a national level. These policies aim to ensure that critical infrastructure is protected, and that there is a move towards a greater state of information security readiness. This is also the case for South Africa where a variety of policy initiatives have started to gain momentum. While establishing strategy and policy is essential, ensuring its implementation is often difficult and dependent on the availability of resources. This is even more so in the case of information security since virtually all standardized security improvement processes start off with specifying that a proper inventory is required of all hardware, software, people and processes. While this may be possible to achieve at an organizational level, it is far more challenging on a national level. In this paper, the authors examine the possibility of making use of available data sources to achieve inventory of infrastructure on a national level and to visualize the state of a country’s information security in at least a partial manner.
DA - 2014-08
DB - ResearchSpace
DP - CSIR
KW - National infrastructure
KW - Information security readiness
KW - Visualisation
KW - Big data
KW - ISO 27001-2
KW - Security metrics
LK - https://researchspace.csir.co.za
PY - 2014
T1 - Towards a platform to visualize the state of South Africa's information security
TI - Towards a platform to visualize the state of South Africa's information security
UR - http://hdl.handle.net/10204/7840
ER -
|
en_ZA |