A UKZN academic has produced a book aimed at creating awareness about the threat and danger of cyber information crime.
Titled: Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution, the book by Ziska Fields, an Associate Professor at the Discipline of Management and Entrepreneurship, is a scholarly resource featuring chapters written by other UKZN academics and postgraduate students.
Fields said she hopes the book will become an essential reference source in the field of information technology, information security and the management of technology in the constantly changing and growing cyberspace.
The cybersecurity hand guide explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the fourth Industrial Revolution.
‘This book aims to highlight possible risks created by current and future technologies in an effort to create awareness and to encourage new thinking around information and cybersecurity. In 2017, two large cybersecurity attacks occurred, North Korea launched the WannaCry in May and the NotPetya in June. These attacks highlighted that the outcome of geopolitical conflicts will now depend on digital code. As well as that the negative consequences of security breaches and cyberwarfare extend far beyond personal and business breaches, and can affect every system utilising technology with direct and devastating consequences on people and the planet,’ explained Fields.
The book consists of 20 chapters building on existing literature and expertise in the field of information technology and security with the aim of becoming a critical scholarly resource for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers. The following chapters are those contributed by UKZN academics and postgraduate students.
• Chapter 1:Social Engineering in Information Security Breaches and the Factors That Explain Its Success: An Oganizational Perspectiveco-authored by Mr Jhaharha Lacram and Dr Indira Padayachee which seeks to analyse the role of social engineering attacks, impacts and mitigations
• Chapter 4: Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution co-authored by Mr John Gyang Chaka and Ms Mudaray Marimuthu seeks to curtail the effects of these threats by enlightening and educating users on the current ways to mitigate them
• Chapter 6: A Generic Self-Evolving Multi-Agent Defense Approach Against Cyber Attacks co-authored by Mr Stephen Magisha Akandwanaho and Dr Irene Govender looks at a generic self-evolving multi-agent approach to overcome the threats of cyber-attacks
• Chapter 12: Developing Cybersecurity Resilience in the Provincial Government co-authored by Mr Harold Patrick, Dr Brett van Niekerk and Professor Ziska Fields explore how the right security strategy of a Computer Security Incident Team (CSIRT) can build better resilience that can protect government operations and control cyber-risks
• Chapter 13: Government’s Dynamic Approach to Addressing Challenges of Cybersecurity in South Africaauthored by Professor Thokozani Nzimakwe discusses government’s dynamic approach to addressing challenges of cybersecurity
• Chapter 14: Information Security Management: A South African Public Sector Perspective co-authored by Mr Harold Patrick, Dr Brett van Niekerk and Professor Ziska Fields looks at how a holistic information security management plan is needed to transform an organization’s approach to mitigate the cyber-risks, protect its infrastructure, devices and data
• Chapter 18: Cyber Security Education in the Fourth Industrial Revolution: The Case of South Africa authored by Mr Paul Kariuki seeks to present a comprehensive analysis of the current trends of cyber security education in South Africa
• Chapter 19: Mobile Device Brand Loyalty of Youth: Perceived Value vs Cybersecurity Choices co-authored by Dr Thea Van der Westhuizen and Mr Thakur Singh aims to ascertain the key factors of brand loyalty and measure what consumers base their decision on whilst selecting a brand
• Chapter 20: Mobile Security in Low-Income Households’ Businesses: A Measure of Financial Inclusion authored by Dr Bibi Chummun focuses on mobile devices security landscape and unprecedented security breaches by cyber criminals and how those threats can be mitigated in a view to promote financial inclusion in the mobile financial service sector of emerging African markets in the midst of the Fourth Industrial Revolution.
‘The contemporary and future impact of the Fourth Industrial Revolution on all facets of human activity, makes a book like this important and beneficial to scholar-practitioners, educationalists, policy makers, government officials, students, researchers, entrepreneurs, executives in various business sectors, business leaders and managers, communities and interested individuals,’ added Fields.
Words: Thandiwe Jumo