A Maturity Model for Part of the African Union Convention on Cyber Security

被引:0
作者
von Solms, Sh [1 ]
机构
[1] Univ Johannesburg, Ctr Cyber Secur, Johannesburg, South Africa
来源
2015 SCIENCE AND INFORMATION CONFERENCE (SAI) | 2015年
关键词
African Union Convention; Cyber Security; Maturity Model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The African Union (AU) Convention on Cyber Security and Personal Data Protection was accepted in June 2014 by the Member States of the AU. For any Member State who intends to take the Convention seriously, it will be very important to have some instrument against which they could evaluate their present Cyber Security position. No such instrument exists presently. The purpose of this paper is to define such an initial instrument. The instrument consists of a Maturity Model for a part of the Convention. The Maturity Model is intended to help Member States of the African Union to evaluate their Cyber Security status against a specific part of the Convention.
引用
收藏
页码:1316 / 1320
页数:5
相关论文
共 50 条
[21]   A Tailored Model for Cyber Security Education Utilizing a Cyber Range [J].
Langner, Gregor ;
Skopik, Florian ;
Furnell, Steven ;
Quirchmayr, Gerald .
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, :365-377
[22]   Information Security Maturity Model for Healthcare Organizations in the United States [J].
Barnes, Bridget ;
Daim, Tugrul .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 :928-939
[23]   Cyber-Security for ICS/SCADA: A South African Perspective [J].
Pretorius, Barend ;
van Niekerk, Brett .
INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2016, 6 (03) :1-16
[24]   Cyber Security Education in Developing Countries: A South African Perspective [J].
Kortjan, Noluxolo ;
von Solms, Rossouw .
E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES, 2013, 119 :289-297
[25]   Adopting security maturity model to the organizations' capability model [J].
Al-Matari, Osamah M. M. ;
Helal, Iman M. A. ;
Mazen, Sherif A. ;
Elhennawy, Sherif .
EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (02) :193-199
[26]   The Defects of the Draft African Union Convention on the Establishment of a Credible Legal Framework for Cybersecurity [J].
Orji, Uchenna Jerome .
2012 THIRD WORLDWIDE CYBERSECURITY SUMMIT (WCS), 2012,
[27]   Maturity Model of Information Security for Software Developers [J].
Silva, M. P. ;
Barros, R. M. .
IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (10) :1994-1999
[28]   A Cyber Security Awareness Model for Distributed Teams [J].
Algamdi, Shabbab Ali ;
Khan, Abdul Wahid ;
Ahmad, Jamshid .
SECURITY AND PRIVACY, 2025, 8 (05)
[29]   Cyber Resiliency in Electric Power Industry Based on the Maturity Model [J].
Ebrahimnezhad, Mohammad ;
Sepehri, Mehran .
CYBERSECURITY IN THE AGE OF SMART SOCIETIES, 2022, 2023, :411-420
[30]   Evaluation of Cyber Threat Intelligence Maturity Models: A Comparison Based on Maturity Model Design Principles [J].
Pambudhi, Heru Dias ;
Aji, Rizal Fathoni .
2022 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT CYBERNETICS TECHNOLOGY & APPLICATIONS (ICICYTA), 2022, :105-110