Cyber security risk management and threat contol model (CSRM-TCM) a study carried out to enhance the protection of information in the Namibian public service

dc.contributor.authorUudhila, Jambeko M.
dc.date.accessioned2016-05-23T13:45:30Z
dc.date.available2016-05-23T13:45:30Z
dc.date.issued2016
dc.descriptionA thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Information Technologyen_US
dc.description.abstractThe persistent threats of the cyber environment drives organizations to adopt risk management as a crucial practice of minimizing dangers to their information assets. However, focusing on technology alone to address these risks is no longer sufficient. IT governance which enables senior managers to align and integrate technology with business strategies through clear policy development and good practice of IT control is essential. The Namibian Public Service (NPS) currently lacks policy guidance on cyber security risk management. Consequently Offices/Ministries/Agencies (O/M/As) depend on technology to manage security risks facing them. However, this effort is not coordinated between various O/M/A. Therefore it presents security challenges to the government network as various systems continues to be interconnected. To address these risks, the study investigated behaviors of different O/M/As in the NPS. The focus was predominantly on the management of information assets in the absence of standardized cyber security best practices. The study concluded that although there may be an abundance of technologies in the (NPS), the absence cyber security policies, standards and guidelines has led to a huge disparity regarding the way in which Information Systems (IS) are managed in various O/M/As. Hence, this poses security challenges. The study further identified threats, vulnerabilities facing the NPS and developed the Cyber Security Management and Threat Control (CSRM-TC) model. The model is believed to assist IT officials and policy makers in the NPS to understand challenges facing their information assets. This would further assist them to make appropriate decisions when developing cyber security policies, standards, guidelines and procedures according to best practices.en_US
dc.identifier.urihttp://hdl.handle.net/11070/1688
dc.language.isoenen_US
dc.publisherUniversity of Namibiaen_US
dc.subjectThreat controlen_US
dc.subjectInformationen_US
dc.subject.lcshInformation technology, Security measures
dc.subject.lcshRisk management
dc.subject.lcshInformation services, Government policy
dc.subject.lcshInformation storage and retrieval systems, Government publications
dc.subject.lcshData protection
dc.titleCyber security risk management and threat contol model (CSRM-TCM) a study carried out to enhance the protection of information in the Namibian public serviceen_US
dc.typeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Uudhila_2016.pdf
Size:
830.43 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: