One small step for a man
One Giant leap for the mankind

There is no wealth like Knowledge
                            No Poverty like Ignorance
Journal of Emerging Trends in Computing and Information Sciences Logo

Journal of Emerging Trends in Computing and Information Sciences >> Call for Papers Vol. 8 No. 3, March 2017

Journal of Emerging Trends in Computing and Information Sciences

Towards Implementation of the Information Security Strategies in South Africa

Full Text Pdf Pdf
Author Moyahabo Rossett Mohlabeng, Sello Nicholas Mokwena, Isaac O. Osunmakinde
ISSN 2079-8407
On Pages 1472-1486
Volume No. 3
Issue No. 11
Issue Date December 01, 2012
Publishing Date December 01, 2012
Keywords Information security, strategy,HEI,data loss,policy, awareness, Infrastructure.


The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in higher education institutions (HEIs). Research was undertaken to investigate the implementation of information security strategies in HEI in South Africa. A survey questionnaire was administered to the personnel of Further Education and Training FET) in the Limpopo Province of South Africa. The study found that HEIs lacked information security strategies and information security awareness education programmes. In the paper, we discuss in detail comprehensive survey of different security attacks on information systems and categorize them as general organizational and HEI-related attacks. We investigate and explain the status of information security implementation strategies used in Capricorn FET College, as well as international practice, and compare the two in terms of security policy coverage and security awareness coverage. A new technical information security framework is proposed and developed, based on ISO 27002, which helps to address HEI information security needs in South Africa. We conducted a deployment survey in Capricorn FET College and Science direct databases on the sub-subsystems of access control, infrastructure and policy awareness ratings of the proposed strategy, based on acceptance of security measures. This paper presents deployment analysis on how the proposed strategy could be used or implemented through real-life scenarios categorised as user-allowed access and user-denied access. We surveyed the information security implementation strategies currently in use and compared them on the basis of track awareness, intrusion prevention control systems and intrusion detection control systems. Further research issues and challenges that still have to be addressed, as well as the design of information security implementation strategies, are presented. The results of this study can be used as a reference guide to understand security management, as well as efficient and reliable implementation strategies of information systems and security strategies for organizations of all sizes.  


    Journal of Computing | Call for Papers (CFP) | Journal Blog | Journal of Systems and Software | ARPN Journal of Science and Technology | International Journal of Health and Medical Sciences | International Journal of Economics, Finance and Management     
© 2015 Journal of Computing