An Analysis of Internet Security Challenges Faced By Organisations in Botswana: The Reviewed Literature

Author(s)

Bogosi Monyamane ,

Download Full PDF Pages: 112-122 | Views: 651 | Downloads: 120 | DOI: 10.5281/zenodo.4678397

Volume 10 - March 2021 (03)

Abstract

The purpose of this paper was to analyse internet security challenges faced by organisations in Botswana. The paper used the Qualitative Content Analysis approach to analyse secondary data from published articles, conference papers, news articles and government publications that provided statistical data about internet security issues that have been reported by organisations in Botswana and other countries. This paper recommended solutions to internet security challenges faced by organisations as follows: Ensuring that all computers are installed with genuine antivirus software; Regular antivirus updates; Ensuring that firewalls are properly configured to block viruses and intrusions; Filtering email traffic; Regular computer scans; regular data backups; Monitoring system logs; Educating users about security issues: Hiring qualified security experts, as well as implementing information security policies. Most importantly organisations should have sustainable financial budgets towards securing their systems.

Keywords

Cyber Crime; Network Security, Cyber Security, Internet Security Challenges; Security Attacks; Security Threats; Security Solutions; Security Mechanisms; Computer Security  

References

                    i.            AllAfrica. (2019). Botswana: 'Botswana Has Huge Cyber Security Skills Gap'. Retrieved from: https://allafrica.com/stories/201909111000.html

      ii.            Arazi, E,. &  Phonsa, V.  (2016). Verizon DBIR 2016: Web Application Attacks are the #1 Source of Data Breaches. https://www.verizondigitalmedia.com/blog/verizon-dbir-2016-web-application-attacks-are-the-1-source-of-data-breaches/

    iii.            Honan, B. (2014). Computer Security –Threats & Solutions, retrieved from: http://bhconsulting .ie/computer-security-threat-solutions/.

     iv.            Giri, G,. Barua, P,. Srivastava & Jana, B. (n.d.). A Cryptosystem for Encryption and Decryption of Long Confidential Messages. Retrieved from: https://link.springer.com/ chapter/10.1007/978-3-642-13365-7_9.

       v.            Ellis, J & Speed, S. (2003). Internet Security: A Jumpstart for Systems Administrators and IT Managers. Elsevier Science, 2003

     vi.            Gigatux (n.d.) Types of Encryption. Retrieved from: http://books.gigatux.nl/mirror/securitytools/ dude/ch09le1sec1.html

   vii.            Gogan, M. (2018). Cyber security Challenges That Need To Be On Your Radar Right Now! . Retrieved From : https://www.readitquik.com/articles/security-2/cybersecurity-challenges-that-need-to-be-on-your-radar-right-now/

 viii.            Dennis A,. Durcikova, A & Fitzgerald, J. (2012), Business Data Communications and Networking, 12th Edition.

     ix.            Frizell, S. (2018). How kenya’s new data privacy bill could hurt its economy, Accessed November 8, 2018. https://www.cfr.org/blog/how-kenyas-new-data-privacy-bill-could-hurt-its-economy. 

       x.            Fruhlinger, J. (2019). What is cyber security? Definition, frameworks, jobs, and salaries. Cyber security covers the whole world of protecting IT from electronic attack—find out how to make that world your career home. Retrieved from: https://www.csoonline.com /article/3482001/what-is-cybersecurity-definition-frameworks-jobs-and-salaries.html

     xi.            Identity Theft Resource Centre. (2020). 2020 Data Breaches. Retrieved from: https://www .idthef tcenter.org/2020-data-breaches/

   xii.            IEEE.ORG (2017). Study Reveals Most Organisations Are Unprepared for Cyber Attack. https://innovationatwork.ieee.org/most-organisations-unprepared-for-cyber-attack/

 xiii.            Johnston, M.  (2013). Secondary Data Analysis: A Method of whichthe Time Has Come. Retrieved from: http://www.qqml.net/papers/September_2014_Issue/336QQML_ Journal_ 2014_Johnston _Sept_619-626.pdf.

 xiv.            Mann, W, E. (2017). Equifax hack exposes a major cyber security gap. Retrieved from: https://finance.yahoo.com/news/equifax-hack-exposes-major-gap-cybersecurity-204311250.html.

   xv.            Mayring, P. (2000). Qualitative Content Analysis, Forum: Qualitative Social Research, 1, Article Number: 20. http://www.qualitativeresearch.net/index.php/fqs/article/view/1089/2385

 xvi.            Mbazo, T.(2019). Cyber security stakeholders introspect. Retrieved from: http://www. botswanaguardian.co.bw/news/item/3945-cyber-security-stakeholders-introspect.html

xvii.            Mike, C. (n.d). choosing the right firewall topology: Bastion host, screened subnet or dual firewalls. Retrievedfrom:http://searchsecurity.techtarget.com/tip/Choosing-the-right-firewall-topology-Bastion-host-screened-subnet-or-dual-firewalls.

xviii.            Nigel, R. (2014). Firewall Policy. Retrieved from: https://www. Royalholloway .ac.uk/it/ tos/policies/firewallpolicy.pdf

 xix.            Techtarget (2011). Network intrusion protection system (NIPS). Retrieved from :  http://whatis. techtarget.com/ definition/network-intrusion-protection-system-NIPS.

   xx.            The Patriot. (2016). Botswana hardest hit by cyber crime. Retrieved from: http://www. thepatriot.co.bw/analysis-opinions/item/3590-botswana-hardest-hit-by-cyber-crime.html

 xxi.            Kaimba , B. (2018). Africa Cyber Security Report – Botswana. A skills gAp is the difference between skills thAt employers want or need, And skills their workforce offer. Retrieved from: https://africancyber.com/Botswana%20Cyber%20Crime%20Repor t%202018-2019.pdf

xxii.            Kaspersky (nd). What is Cyber Security? Retrieved from: https://www.kaspersky.Com/resource-center/definitions/what-is-cyber-security

xxiii.            Prince, K. (2009) Top 9 IT Threats and Solutions, Retrieved from: http://www.s-ox.com/dsp_getfeuturesDetails.cfm?CID=2461

xxiv.            Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa. Retrieved from:https://doi.org/10.1080/ 1097198X.2019.160352

xxv.            Kshetri, N. (2015). Cybercrime and cyber security issues in the BRICS economies. Journal of Global Information Technology Management, 18(4), 1–5.  Retrieved from: doi:10.1080/1097198X.2015. 1108093

xxvi.            Quest Technology Management (n.d). Disaster Recovery and Business Continuity Planning. Retrieved from https://www.questsys.com/disaster-recovery-services.aspx. Accessed 15 /03/2018.

xxvii.            Rhee, M. Y. (2003). Internet Security: Cryptographic Principles, Algorithms and Protocols. Chichester: Wiley. ISBN 0-470-85285

xxviii.            Symantec Corporation (2016). Cyber Crime& Cyber Security. Retrieved from:https:// www. The haguesecuritydelta.com/ media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf.

xxix.            Yan, Q.; Yu, F. R.; Gong, Q.; Li, J. (2016). "Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges". IEEE Communications Surveys and Tutorials. 18 (1): 602–622. Retrieved from: doi:10.1109/COMST.2015.2487361

Cite this Article: