An Analysis of Internet Security Challenges Faced By Organisations in Botswana: The Reviewed Literature
Author(s)
Download Full PDF Pages: 112-122 | Views: 680 | Downloads: 130 | DOI: 10.5281/zenodo.4678397
Abstract
The purpose of this paper was to analyse internet security challenges faced by organisations in Botswana. The paper used the Qualitative Content Analysis approach to analyse secondary data from published articles, conference papers, news articles and government publications that provided statistical data about internet security issues that have been reported by organisations in Botswana and other countries. This paper recommended solutions to internet security challenges faced by organisations as follows: Ensuring that all computers are installed with genuine antivirus software; Regular antivirus updates; Ensuring that firewalls are properly configured to block viruses and intrusions; Filtering email traffic; Regular computer scans; regular data backups; Monitoring system logs; Educating users about security issues: Hiring qualified security experts, as well as implementing information security policies. Most importantly organisations should have sustainable financial budgets towards securing their systems.
Keywords
Cyber Crime; Network Security, Cyber Security, Internet Security Challenges; Security Attacks; Security Threats; Security Solutions; Security Mechanisms; Computer Security
References
i. AllAfrica. (2019). Botswana: 'Botswana Has Huge Cyber Security Skills Gap'. Retrieved from: https://allafrica.com/stories/201909111000.html
ii. Arazi, E,. & Phonsa, V. (2016). Verizon DBIR 2016: Web Application Attacks are the #1 Source of Data Breaches. https://www.verizondigitalmedia.com/blog/verizon-dbir-2016-web-application-attacks-are-the-1-source-of-data-breaches/
iii. Honan, B. (2014). Computer Security –Threats & Solutions, retrieved from: http://bhconsulting .ie/computer-security-threat-solutions/.
iv. Giri, G,. Barua, P,. Srivastava & Jana, B. (n.d.). A Cryptosystem for Encryption and Decryption of Long Confidential Messages. Retrieved from: https://link.springer.com/ chapter/10.1007/978-3-642-13365-7_9.
v. Ellis, J & Speed, S. (2003). Internet Security: A Jumpstart for Systems Administrators and IT Managers. Elsevier Science, 2003
vi. Gigatux (n.d.) Types of Encryption. Retrieved from: http://books.gigatux.nl/mirror/securitytools/ dude/ch09le1sec1.html
vii. Gogan, M. (2018). Cyber security Challenges That Need To Be On Your Radar Right Now! . Retrieved From : https://www.readitquik.com/articles/security-2/cybersecurity-challenges-that-need-to-be-on-your-radar-right-now/
viii. Dennis A,. Durcikova, A & Fitzgerald, J. (2012), Business Data Communications and Networking, 12th Edition.
ix. Frizell, S. (2018). How kenya’s new data privacy bill could hurt its economy, Accessed November 8, 2018. https://www.cfr.org/blog/how-kenyas-new-data-privacy-bill-could-hurt-its-economy.
x. Fruhlinger, J. (2019). What is cyber security? Definition, frameworks, jobs, and salaries. Cyber security covers the whole world of protecting IT from electronic attack—find out how to make that world your career home. Retrieved from: https://www.csoonline.com /article/3482001/what-is-cybersecurity-definition-frameworks-jobs-and-salaries.html
xi. Identity Theft Resource Centre. (2020). 2020 Data Breaches. Retrieved from: https://www .idthef tcenter.org/2020-data-breaches/
xii. IEEE.ORG (2017). Study Reveals Most Organisations Are Unprepared for Cyber Attack. https://innovationatwork.ieee.org/most-organisations-unprepared-for-cyber-attack/
xiii. Johnston, M. (2013). Secondary Data Analysis: A Method of whichthe Time Has Come. Retrieved from: http://www.qqml.net/papers/September_2014_Issue/336QQML_ Journal_ 2014_Johnston _Sept_619-626.pdf.
xiv. Mann, W, E. (2017). Equifax hack exposes a major cyber security gap. Retrieved from: https://finance.yahoo.com/news/equifax-hack-exposes-major-gap-cybersecurity-204311250.html.
xv. Mayring, P. (2000). Qualitative Content Analysis, Forum: Qualitative Social Research, 1, Article Number: 20. http://www.qualitativeresearch.net/index.php/fqs/article/view/1089/2385
xvi. Mbazo, T.(2019). Cyber security stakeholders introspect. Retrieved from: http://www. botswanaguardian.co.bw/news/item/3945-cyber-security-stakeholders-introspect.html
xvii. Mike, C. (n.d). choosing the right firewall topology: Bastion host, screened subnet or dual firewalls. Retrievedfrom:http://searchsecurity.techtarget.com/tip/Choosing-the-right-firewall-topology-Bastion-host-screened-subnet-or-dual-firewalls.
xviii. Nigel, R. (2014). Firewall Policy. Retrieved from: https://www. Royalholloway .ac.uk/it/ tos/policies/firewallpolicy.pdf
xix. Techtarget (2011). Network intrusion protection system (NIPS). Retrieved from : http://whatis. techtarget.com/ definition/network-intrusion-protection-system-NIPS.
xx. The Patriot. (2016). Botswana hardest hit by cyber crime. Retrieved from: http://www. thepatriot.co.bw/analysis-opinions/item/3590-botswana-hardest-hit-by-cyber-crime.html
xxi. Kaimba , B. (2018). Africa Cyber Security Report – Botswana. A skills gAp is the difference between skills thAt employers want or need, And skills their workforce offer. Retrieved from: https://africancyber.com/Botswana%20Cyber%20Crime%20Repor t%202018-2019.pdf
xxii. Kaspersky (nd). What is Cyber Security? Retrieved from: https://www.kaspersky.Com/resource-center/definitions/what-is-cyber-security
xxiii. Prince, K. (2009) Top 9 IT Threats and Solutions, Retrieved from: http://www.s-ox.com/dsp_getfeuturesDetails.cfm?CID=2461
xxiv. Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa. Retrieved from:https://doi.org/10.1080/ 1097198X.2019.160352
xxv. Kshetri, N. (2015). Cybercrime and cyber security issues in the BRICS economies. Journal of Global Information Technology Management, 18(4), 1–5. Retrieved from: doi:10.1080/1097198X.2015. 1108093
xxvi. Quest Technology Management (n.d). Disaster Recovery and Business Continuity Planning. Retrieved from https://www.questsys.com/disaster-recovery-services.aspx. Accessed 15 /03/2018.
xxvii. Rhee, M. Y. (2003). Internet Security: Cryptographic Principles, Algorithms and Protocols. Chichester: Wiley. ISBN 0-470-85285
xxviii. Symantec Corporation (2016). Cyber Crime& Cyber Security. Retrieved from:https:// www. The haguesecuritydelta.com/ media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf.
xxix. Yan, Q.; Yu, F. R.; Gong, Q.; Li, J. (2016). "Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges". IEEE Communications Surveys and Tutorials. 18 (1): 602–622. Retrieved from: doi:10.1109/COMST.2015.2487361
Cite this Article: