Cybersecurity Management in South African Universities

Cybersecurity Management in South African Universities

DOI: 10.4018/978-1-6684-5827-3.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The study aimed to assess cyber security at South African universities. The researcher will use literature to assess the state of cybersecurity at South African universities. The results from the literature review revealed poor implementation and adherence of cyber security strategy and standards by employees and students; poor cyber security awareness relative to information communication technology (ICT) infrastructures and assets; and lack of strategy and framework to implement cyber security management. The study recommends continuous monitoring and evaluation of information management systems at various South African universities with the view to assess the state. A replica of the study may be studied in other part of the world.
Chapter Preview
Top

Background

Cybersecurity occurs as a form of hackers attacking business information in an electronic environment (Borgman, 2018; Moskai, 2015, p. 97; Villegas-Ch, Garges, Viteri 2021). Hackers accessed the organization's remote server to damage electronic contents management systems which store data in the networked and the physical infrastructure (Kundy & Lyimo, 2019). To prevent hacking, the security breaches requires organizations to enhance security systems by ensuring that a governance structure or committee was established to execute the oversight role over security management compliance. Executive management of the institutions were responsible to establish such committee. An organization developed systems and processes to ensure that measures were in place to control access to networked systems and the information contained. Cybersecurity threats required to be protected by various organizations all over the world.

Security of information was identified as one of the risks in the strategic or operational risk registers of universities (Abdulrauf & Fombad, 2017, p. 106). As a preventive measurement, universities developed an action plan to counter the threat posed by hackers. The effective way to implement an action plan was to facilitate cybersecurity workshops, and develop processes and procedures to comply with Legislation such as the Protection of Personal Information Act no. 4 of 2013 (POPIA) and the Promotion of Access to Information of 2002 (PAIA).These legislations advocate for the protection of personal information. This implied that organisations should regularly clear content that was no longer active, such as data relating to a university program, and develop a data privacy breach management process, Universities should develop a cyber security policy to protect its data from attack. The policy should be developed in compliance with the above mentioned legislations. Process and procedure were to aligned with the organization's requirements. The retention schedule should be embedded in the university system, develop backup and restoration policies and procedures., provide user access management policies and procedures, and provide IT security policy. Protection of information applies to all employees and university stakeholders.

Higher education institutions in South Africa adopted content management systems to aid in teaching, learning, and research. Hackers used the internet to tackle their systems. Universities are not supposed to work in isolation with other universities on system sharing (Olatunbosun, Edwards, and Martineau, 2018, p. 07).

Key Terms in this Chapter

Information privacy: This is the relationship between the collection and dissemination of data, technology within an organization.

Governance: The system introduced by universities to ensure compliance with appropriate legislation and framework.

South African Universities: These are 26 public South African universities established in South Africa.

Cloud Computing: This is a process of using an internet system to store, manage and process data.

Data Protection: It is the protection of privacy in an electronic environment.

Internationalization: This is a process of ensuring that the university engaged with other institutions nationally and internationally to promote and market the university.

Complete Chapter List

Search this Book:
Reset