An investigation into the cybersecurity skills gap in South Africa
- Authors: De Jager, Michael
- Date: 2023-04
- Subjects: Criminal investigation , Information technology--Security measures -- South Africa
- Language: English
- Type: Master's theses , Thesis
- Identifier: http://hdl.handle.net/10948/60635 , vital:66247
- Description: The usage of the internet both in our daily lives and in the operations of organisations has grown significantly in modern society. However, there are also risks and vulnerabilities associated with this, thus cyber threats. Cybersecurity has been put in place to safeguard the internet from these cyber threats, yet there is an ever-growing concern regarding the implementation of cybersecurity, both globally and in South Africa. With the increase in cyber threats, there is a growing need and demand for IT professionals with the requisite cybersecurity skills and knowledge to combat and mitigate these threats. However, an ever-increasing cybersecurity skills gap has been identified both globally and in South Africa. Yet the specific cybersecurity skills demand, needs and challenges of IT professionals in South Africa are currently unknown. This study therefore investigated the cybersecurity skills demand, needs, and challenges of IT professionals in South Africa by reporting on IT professionals’ perceptions in this regard. An online questionnaire was used to gather information for this and was distributed to IT professionals using various online platforms. According to the findings of the study, there are several challenges such as lack of time, lack of funding and a lack of resources that South Africa must overcome in order to address the cybersecurity skills gap. From the survey results it was also found that neither tertiary institutions, nor organisations, nor the South African government are investing enough in cybersecurity skills development. Without the right cybersecurity skills set or investment in the development of cybersecurity skills, cyber threats will continue to increase and will potentially become more harmful to South African organisations and to the South African society at large. Furthermore, this study addresses the extent to which cybersecurity-related skills are required and currently used by IT professionals in South Africa to address the cybersecurity skills gap. Tertiary institutions, organisations and the South African government may benefit from this investigation as it could assist in the development of cybersecurity course work as well as national cybersecurity laws, legislations and policies. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2023
- Full Text:
- Date Issued: 2023-04
- Authors: De Jager, Michael
- Date: 2023-04
- Subjects: Criminal investigation , Information technology--Security measures -- South Africa
- Language: English
- Type: Master's theses , Thesis
- Identifier: http://hdl.handle.net/10948/60635 , vital:66247
- Description: The usage of the internet both in our daily lives and in the operations of organisations has grown significantly in modern society. However, there are also risks and vulnerabilities associated with this, thus cyber threats. Cybersecurity has been put in place to safeguard the internet from these cyber threats, yet there is an ever-growing concern regarding the implementation of cybersecurity, both globally and in South Africa. With the increase in cyber threats, there is a growing need and demand for IT professionals with the requisite cybersecurity skills and knowledge to combat and mitigate these threats. However, an ever-increasing cybersecurity skills gap has been identified both globally and in South Africa. Yet the specific cybersecurity skills demand, needs and challenges of IT professionals in South Africa are currently unknown. This study therefore investigated the cybersecurity skills demand, needs, and challenges of IT professionals in South Africa by reporting on IT professionals’ perceptions in this regard. An online questionnaire was used to gather information for this and was distributed to IT professionals using various online platforms. According to the findings of the study, there are several challenges such as lack of time, lack of funding and a lack of resources that South Africa must overcome in order to address the cybersecurity skills gap. From the survey results it was also found that neither tertiary institutions, nor organisations, nor the South African government are investing enough in cybersecurity skills development. Without the right cybersecurity skills set or investment in the development of cybersecurity skills, cyber threats will continue to increase and will potentially become more harmful to South African organisations and to the South African society at large. Furthermore, this study addresses the extent to which cybersecurity-related skills are required and currently used by IT professionals in South Africa to address the cybersecurity skills gap. Tertiary institutions, organisations and the South African government may benefit from this investigation as it could assist in the development of cybersecurity course work as well as national cybersecurity laws, legislations and policies. , Thesis (MIT) -- Faculty of Engineering, the Built Environment and Technology, School of Information Technology, 2023
- Full Text:
- Date Issued: 2023-04
A Framework for using Open Source intelligence as a Digital Forensic Investigative tool
- Authors: Rule, Samantha Elizabeth
- Date: 2015
- Subjects: Open source intelligence , Criminal investigation , Electronic evidence
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4715 , http://hdl.handle.net/10962/d1017937
- Description: The proliferation of the Internet has amplified the use of social networking sites by creating a platform that encourages individuals to share information. As a result there is a wealth of information that is publically and easily accessible. This research explores whether open source intelligence (OSINT), which is freely available, could be used as a digital forensic investigative tool. A survey was created and sent to digital forensic investigators to establish whether they currently use OSINT when performing investigations. The survey results confirm that OSINT is being used by digital forensic investigators when performing investigations but there are currently no guidelines or frameworks available to support the use thereof. Additionally, the survey results showed a belief amongst those surveyed that evidence gleaned from OSINT sources is considered supplementary rather than evidentiary. The findings of this research led to the development of a framework that identifies and recommends key processes to follow when conducting OSINT investigations. The framework can assist digital forensic investigators to follow a structured and rigorous process, which may lead to the unanimous acceptance of information obtained via OSINT sources as evidentiary rather than supplementary in the near future.
- Full Text:
- Date Issued: 2015
- Authors: Rule, Samantha Elizabeth
- Date: 2015
- Subjects: Open source intelligence , Criminal investigation , Electronic evidence
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4715 , http://hdl.handle.net/10962/d1017937
- Description: The proliferation of the Internet has amplified the use of social networking sites by creating a platform that encourages individuals to share information. As a result there is a wealth of information that is publically and easily accessible. This research explores whether open source intelligence (OSINT), which is freely available, could be used as a digital forensic investigative tool. A survey was created and sent to digital forensic investigators to establish whether they currently use OSINT when performing investigations. The survey results confirm that OSINT is being used by digital forensic investigators when performing investigations but there are currently no guidelines or frameworks available to support the use thereof. Additionally, the survey results showed a belief amongst those surveyed that evidence gleaned from OSINT sources is considered supplementary rather than evidentiary. The findings of this research led to the development of a framework that identifies and recommends key processes to follow when conducting OSINT investigations. The framework can assist digital forensic investigators to follow a structured and rigorous process, which may lead to the unanimous acceptance of information obtained via OSINT sources as evidentiary rather than supplementary in the near future.
- Full Text:
- Date Issued: 2015
The development of a pro forma document for use in police rape investigations in South Africa
- Authors: Netto, Lauren Joy
- Date: 2000
- Subjects: Interviewing in law enforcement , Criminal investigation , Police questioning -- Forms , Rape -- Investigation -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3031 , http://hdl.handle.net/10962/d1002540 , Interviewing in law enforcement , Criminal investigation , Police questioning -- Forms , Rape -- Investigation -- South Africa
- Description: This research developed a pro forma document for use in police rape investigations in South Africa. The immediate context for the research is the alarmingly high incidence of rape in South Africa. The rape statistics vary to an extent, largely due to the fact that a large proportion of the rapes that occur in South Africa are not reported to the police. These statistics expose the limited success of the South African Police Services (SAPS) in terms of investigating rape cases in this country, as well as the public perception of the effectiveness of the South African Police Services in this regard as evidenced by the non or under-reporting of rape in South Africa. The pro forma document is an investigative tool designed to standardise and systematise rape investigations by providing set guidelines for obtaining the essential information about each rape case. This is a prerequisite for Tender profiling, which involves predicting the relationship between offence and offender variables. Profiling can only be successful if the investigator obtains all the information about a crime. Hence the pro forma document, as an investigative instrument designed to access essential information about a crime, is a key requirement for the development of informed and accurate profiles of offenders. As a standardised form, the document will allow for systematic and thorough rape investigations in South Africa. The researcher employed the qualitative methodology of action research. This entailed involving the participants in all stages of the research process. The data was collected by means of focus group interviews with detectives from the Serious and Violent Crimes Unit and the Child Protection Unit in Grahamstown. Additional sources of data were various investigative documents that originated from a number of different countries. Analysis of the data followed a number of procedural steps specifically suggested for focus group interview research and involved a process of coding. The codes identified during the analysis provided the foundation for the items that were included in the pro forma document. In keeping with the action research approach, the participants were caned upon to evaluate the progress of the research after the initial data collection and analysis were completed, and a draft version of the pro forma document had been compiled. This feedback provided another source of data which contained suggestions for amendments to the pro forma document which the researcher implemented. The research process was hindered to a certain extent by the unpredictable nature of police work which influenced the data gathering procedure. This could point to a possible limitation of the research. Furthermore, the aim of the research was to develop a pro forma document for use in rape investigations in South Africa. This aim did not encompass marketing the document. Herein lies another possible limitation of the research in that the document has not yet been used and tested in real cases. A discussion of the research process includes issues involved in practically implementing the pro forma document in rape investigations.
- Full Text:
- Date Issued: 2000
- Authors: Netto, Lauren Joy
- Date: 2000
- Subjects: Interviewing in law enforcement , Criminal investigation , Police questioning -- Forms , Rape -- Investigation -- South Africa
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3031 , http://hdl.handle.net/10962/d1002540 , Interviewing in law enforcement , Criminal investigation , Police questioning -- Forms , Rape -- Investigation -- South Africa
- Description: This research developed a pro forma document for use in police rape investigations in South Africa. The immediate context for the research is the alarmingly high incidence of rape in South Africa. The rape statistics vary to an extent, largely due to the fact that a large proportion of the rapes that occur in South Africa are not reported to the police. These statistics expose the limited success of the South African Police Services (SAPS) in terms of investigating rape cases in this country, as well as the public perception of the effectiveness of the South African Police Services in this regard as evidenced by the non or under-reporting of rape in South Africa. The pro forma document is an investigative tool designed to standardise and systematise rape investigations by providing set guidelines for obtaining the essential information about each rape case. This is a prerequisite for Tender profiling, which involves predicting the relationship between offence and offender variables. Profiling can only be successful if the investigator obtains all the information about a crime. Hence the pro forma document, as an investigative instrument designed to access essential information about a crime, is a key requirement for the development of informed and accurate profiles of offenders. As a standardised form, the document will allow for systematic and thorough rape investigations in South Africa. The researcher employed the qualitative methodology of action research. This entailed involving the participants in all stages of the research process. The data was collected by means of focus group interviews with detectives from the Serious and Violent Crimes Unit and the Child Protection Unit in Grahamstown. Additional sources of data were various investigative documents that originated from a number of different countries. Analysis of the data followed a number of procedural steps specifically suggested for focus group interview research and involved a process of coding. The codes identified during the analysis provided the foundation for the items that were included in the pro forma document. In keeping with the action research approach, the participants were caned upon to evaluate the progress of the research after the initial data collection and analysis were completed, and a draft version of the pro forma document had been compiled. This feedback provided another source of data which contained suggestions for amendments to the pro forma document which the researcher implemented. The research process was hindered to a certain extent by the unpredictable nature of police work which influenced the data gathering procedure. This could point to a possible limitation of the research. Furthermore, the aim of the research was to develop a pro forma document for use in rape investigations in South Africa. This aim did not encompass marketing the document. Herein lies another possible limitation of the research in that the document has not yet been used and tested in real cases. A discussion of the research process includes issues involved in practically implementing the pro forma document in rape investigations.
- Full Text:
- Date Issued: 2000
- «
- ‹
- 1
- ›
- »