Abstract
Cyber security is an important aspect of National Security and the safekeeping of a Nation’s constituency and resources. In South Africa, the focus on cyber security is especially prominent since many geographical regions are incorporated into the global village in an attempt to bridge the digital divide. This article reflects on current research done in South Africa with regard to a cyber security policy, and proposes the development of methodologies and frameworks that will enable the implementation of such a policy. The focus of this article is the use of an ontology-based methodology to identify and propose a formal, encoded description of the cyber security strategic environment. The aim of the ontology is to identify and represent the multi-layered organisation of players and their associated roles and responsibilities within the cyber security environment. This will contribute largely to the development, implementation and rollout of a national cyber security policy in South Africa.
Chapter PDF
Similar content being viewed by others
References
Acts: Acts Online (2012), http://www.acts.co.za/ (accessed March 28, 2012)
Baader, F., Calvenese, D., McGuinness, D., Nardi, D., Patel-Schneider, P.: The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, Cambridge (2003)
Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Scientific American 284(5), 33–43 (2001)
Boury-Brisset, A.: Ontological Approach to Military Knowledge Modeling and Management. In: Symposium on Military Data and Information Fusion, Czech Republic, Prague (2003)
Council of Europe: Convention on Cybercrime. CETS No.: 185 (2010), http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=8&DF=28/10/2010&CL=ENG (accessed March 28, 2012)
Cuppens-Boulahia, N., Cuppens, F., de Vergara, L., Vázquez, E., Guerra, J., Debar, H.: An Ontology-based Approach to React to Network Attacks. International Journal of Information and Computer Security 3(4), 280–305 (2009)
Davis, G.: State Security in Charge of Cybercrime Plans (2012), http://www.iol.co.za/dailynews/news/state-security-in-charge-of-cybercrime-plans-1.1238243 (accessed February 21, 2012)
Department of Communications: National Cybersecurity Policy Framework for South Africa – Draft. Unpublished document (2011)
Ghernouti-Hélie, S.: A National Strategy for an Effective Cybersecurity Approach and Culture. In: ARES 2010 International Conference on Availability, Reliability and Security, Krakow, pp. 370–373 (2010)
Grobler, M., Bryk, H.: Common Challenges Faced During the Establishment of a CSIRT. Presented at the ISSA Conference 2010, Sandton, South Africa (2010)
Grobler, M., Flowerday, S., Von Solms, R., Venter, H.: Cyber Awareness Initiatives in South Africa: A National Perspective. In: Proceedings of Southern African Cyber Security Awareness Workshop (SACSAW 2011), pp. 32–41 (2011)
Grobler, M., Dlamini, Z.: Global Cyber Trends a South African Reality. In: Proceedings of IST-Africa Conference (IST-Africa 2012) (2012)
Grüber, T.: A translation approach to portable ontology specifications. Knowledge Acquisition 5, 191–220 (1993)
Guy: Cyber Security Policy Will Go Before Cabinet For Approval This Year (2011), http://www.defenceweb.co.za/index.php?option=com_content&view=article&id=13783:cyber-security-policy-will-go-before-cabinet-for-approval-this-year&catid=48:Information%20%20Communication%20Technologies&Itemid=109 (accessed February 24, 2012)
ICT Procurement: Cyber Security Mandate Transferred (2012), http://ictprocurement.com/security/cyber-security-mandate-transferred.html (Accessed May 3, 2012)
Internetworldstats: Internet Usage Statistics for Africa (2012), http://www.internetworldstats.com/stats1.htm (accessed February 27, 2012)
Jansen van Vuuren, J.C., Grobler, M.M., Zaaiman, J.: The Influence of Cyber Security Levels of South African Citizens on National Security. In: Proceedings of ICIW 2012, Seattle, USA, pp. 138–147 (2012)
Kramer, F.D.: Cyberpower and National Security: Policy Recommendations for a Strategic Framework. In: Kramer, F.D., Star, S.H., Wentz, L.K. (eds.) Cyberpower and National Security, pp. 3–23. Centre for Technical and National Security Policy, Washington (2009)
Moyo, A. , Kayle, A.: DOC Calls for Collaboration, Security Innovation (2012), www.itweb.co.za/index.php?option=Com_content&view=article&id=54874 (accessed August 8, 2012)
Noy, N.F., McGuiness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology. Technical Report KSL-01-05. Stanford Knowledge Systems Laboratory (2001)
Phahlamohlaka, L.J., Jansen van Vuuren, J.C., Radebe, J.: Cyber Security Awareness Toolkit for National Security: an Approach to South Africa’s Cyber Security Policy Implementation. In: Proceedings of the First IFIP TC9/ TC11 Southern African Cyber Security Awareness Workshop 2011 (SACSAW 2011), Gaborone, Botswana, pp. 1–14 (2011)
OWL 2 Web Ontology Language (2012), http://www.w3.org/TR/owl-overview (accessed March 27, 2012)
Protégé ontology editor (2012), http://protege.stanford.edu/ (accessed February 7, 2012)
Ritchey, T.: Wicked Problems. Structuring Social Messes with Morphological Analysis. Adapted from a lecture given at the Royal Institute of Technology in Stockholm (2004), www.swemorph.com/downloads.html (2005)
Smith, B., Miettinen, K., Mandrivk, W.: The Ontology of Command and Control. In: Proceedings of the 14th International Command and Control Research and Technology Symposium, Buffalo, National Centre for Ontological Research, New York (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Grobler, M., van Vuuren, J.J., Leenen, L. (2012). Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward. In: Hercheui, M.D., Whitehouse, D., McIver, W., Phahlamohlaka, J. (eds) ICT Critical Infrastructures and Society. HCC 2012. IFIP Advances in Information and Communication Technology, vol 386. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33332-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-33332-3_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33331-6
Online ISBN: 978-3-642-33332-3
eBook Packages: Computer ScienceComputer Science (R0)