South Africa

Review of Cyber Security and Policy Implementation within South African Health Institutions

Abstract:

The evolution in digital technologies and the Internet, in particular, has had a profound effect on the way healthcare institutions operate, assist patients, and manage personal healthcare data. In the same vein, various healthcare systems, particularly Electronic Health Information Technology (EHIT), present new opportunities for different healthcare institutions. As the exposure to and use of the Internet in the health sector continue to increase, so have the opportunities and benefits offered to applicable stakeholders. However, threats to the security, privacy, availability, and integrity of healthcare data and systems have also increased. 

Preparing for the Fourth Industrial Revolution: Recommendations to Adapt Cyber Security Governance and Skills in South Africa

Abstract:

As the Fourth Industrial Revolution (4IR) is unfolding in the society around us, gaps and opportunities are revealed in terms of cyber security governance and policy responses. Therefore, within this article, the shortcomings of cyber security implementation in South Africa are identified and recommendations are made in terms of cyber security governance, policy, education, and awareness. In terms of governance, the maturity of South Africa’s implementation systems is analyzed using the international metric systems.

The Evolution of Cyber Threats in the South African Context

Abstract:

Cyber threats and criminals continue to evolve their modus operandi in order to take advantage of users. Globally, threat vectors may be modified in order to provide a new avenue of exploitation. This paper provides an assessment of the development of cyber threats in the South African context. The aim is to create awareness of how cyber threats are developing and advancing. In this paper, the authors investigate the progression of existing threats globally and how threat actors are adapting their tactics in order to further exploit users. For the South African audience, it aims to provide a fresh perspective on how threats will advance in the short term so as to develop more adaptive methods of defence and security.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com