dc.contributor.author |
Jansen van Vuuren, JC
|
|
dc.contributor.author |
Leenen, L
|
|
dc.contributor.author |
Zaaiman, JJ
|
|
dc.date.accessioned |
2015-02-09T07:34:19Z |
|
dc.date.available |
2015-02-09T07:34:19Z |
|
dc.date.issued |
2014-03 |
|
dc.identifier.citation |
Jansen van Vuuren, J.C, Leenen, L and Zaaiman, J.J. 2014. Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa. In: 9th International Conference on Cyber Warfare and Security, 2014, Purdue University, West Lafayette, Indiana, USA, 24-25 March 2014 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10204/7869
|
|
dc.description |
9th International Conference on Cyber Warfare and Security, 2014, Purdue University, West Lafayette, Indiana, USA, 24-25 March 2014 |
en_US |
dc.description.abstract |
Many developing countries are particularly vulnerable to cyber security threats due to an enormous growth in Internet connectivity rates over the past decade. The South African government approved a draft version of its National Cybersecurity Policy Framework in March 2012. Although implementation of this policy has been initiated in a few isolated instances, a holistic approach is lacking. Due to the cybersecurity environment not being clearly bounded and defined, it is very difficult to put forward a National Cybersecurity Policy Framework that is easy to understand and implement. In this paper, the authors motivate that an ontology can assist in defining a model that describes the relationships between different stakeholders and cybersecurity components that are relevant in the policy implementation. An ontology is a technology that enables an encoded, shareable vocabulary and domain model and it has powerful automated reasoning abilities. This methodology can contribute to a more holistic approach for the implementation of the South African National Cybersecurity policy. The Extended Cyber Security Toolkit (XCyberST) (Jansen van Vuuren, Leenen, Phahlamohlaka, & Zaaiman 2013) as the basis for mapping cybersecurity entities to functions, was the initial attempt to model the national cybersecurity policy environment in South Africa. The authors proposed the use of an ontological model for the cybersecurity policy implementation in a previous paper (Grobler, van Vuuren, & Leenen 2012), and this model is now presented. The model is partially based on information in the XCyberST and implemented in Protégé, an ontology editor. Although this model has been developed for the South African cybersecurity environment, it can easily be adapted to be used in other countries. |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.ispartofseries |
Workflow;13920 |
|
dc.subject |
South African cyber security |
en_US |
dc.subject |
Cybersecurity toolkit |
en_US |
dc.subject |
Police implementation |
en_US |
dc.subject |
Ontologies |
en_US |
dc.subject |
National cybersecurity policy framework |
en_US |
dc.title |
Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Jansen van Vuuren, J., Leenen, L., & Zaaiman, J. (2014). Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa. http://hdl.handle.net/10204/7869 |
en_ZA |
dc.identifier.chicagocitation |
Jansen van Vuuren, JC, L Leenen, and JJ Zaaiman. "Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa." (2014): http://hdl.handle.net/10204/7869 |
en_ZA |
dc.identifier.vancouvercitation |
Jansen van Vuuren J, Leenen L, Zaaiman J, Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa; 2014. http://hdl.handle.net/10204/7869 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Jansen van Vuuren, JC
AU - Leenen, L
AU - Zaaiman, JJ
AB - Many developing countries are particularly vulnerable to cyber security threats due to an enormous growth in Internet connectivity rates over the past decade. The South African government approved a draft version of its National Cybersecurity Policy Framework in March 2012. Although implementation of this policy has been initiated in a few isolated instances, a holistic approach is lacking. Due to the cybersecurity environment not being clearly bounded and defined, it is very difficult to put forward a National Cybersecurity Policy Framework that is easy to understand and implement. In this paper, the authors motivate that an ontology can assist in defining a model that describes the relationships between different stakeholders and cybersecurity components that are relevant in the policy implementation. An ontology is a technology that enables an encoded, shareable vocabulary and domain model and it has powerful automated reasoning abilities. This methodology can contribute to a more holistic approach for the implementation of the South African National Cybersecurity policy. The Extended Cyber Security Toolkit (XCyberST) (Jansen van Vuuren, Leenen, Phahlamohlaka, & Zaaiman 2013) as the basis for mapping cybersecurity entities to functions, was the initial attempt to model the national cybersecurity policy environment in South Africa. The authors proposed the use of an ontological model for the cybersecurity policy implementation in a previous paper (Grobler, van Vuuren, & Leenen 2012), and this model is now presented. The model is partially based on information in the XCyberST and implemented in Protégé, an ontology editor. Although this model has been developed for the South African cybersecurity environment, it can easily be adapted to be used in other countries.
DA - 2014-03
DB - ResearchSpace
DP - CSIR
KW - South African cyber security
KW - Cybersecurity toolkit
KW - Police implementation
KW - Ontologies
KW - National cybersecurity policy framework
LK - https://researchspace.csir.co.za
PY - 2014
T1 - Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa
TI - Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa
UR - http://hdl.handle.net/10204/7869
ER -
|
en_ZA |