Integrating Enterprise Architecture into Cybersecurity Risk Management in Higher Education

Сохранить в:
Библиографические подробности
Опубликовано в::International Conference on Cyber Warfare and Security (Mar 2024), p. 501
Главный автор: Nkambule, Mafika
Другие авторы: van Vuuren, Joey Jansen, Leenen, Louise
Опубликовано:
Academic Conferences International Limited
Предметы:
Online-ссылка:Citation/Abstract
Full Text
Full Text - PDF
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!

MARC

LEADER 00000nab a2200000uu 4500
001 3082337046
003 UK-CbPIL
035 |a 3082337046 
045 2 |b d20240301  |b d20240331 
084 |a 142229  |2 nlm 
100 1 |a Nkambule, Mafika  |u Tshwane University of Technology, Pretoria, South Africa 
245 1 |a Integrating Enterprise Architecture into Cybersecurity Risk Management in Higher Education 
260 |b Academic Conferences International Limited  |c Mar 2024 
513 |a Conference Proceedings 
520 3 |a Cybercriminals constantly seek new methods to infiltrate a company's defences, making cybersecurity investments essential. Enterprise architecture (EA) provides a systematic risk detection and mitigation process by emphasising the interdependencies between systems, data, processes, people, and other factors. This paper provides a comprehensive approach, also referred to as a process, based on EA to assist African universities in developing a comprehensive cybersecurity plan. The EA process comprises four pillars: business architecture, data architecture, application architecture, and technology architecture. African universities can develop a comprehensive cybersecurity strategy using an EA approach in cybersecurity to achieve institutional goals and objectives. The potential attack surface comprises isolated EA components and their interconnections. This article comprehensively examines various EA processes such as business, information, application, and technology architecture. These processes are carefully analysed to evaluate the organisational structures and uncover opportunities to enhance security protocols. Additionally, we delve deep into abstract security patterns, seeking to cultivate an environment of trustworthiness within complex systems. Our research findings underscore the significant potential within African higher education institutions. By embracing a model-based approach to risk analysis and mitigation, these institutions can fortify their cybersecurity defences and bolster their capabilities to ensure uninterrupted business operations and enhance overall resilience in the face of evolving security challenges. When we combine EA and information security (ICS), we uncover many vulnerabilities malicious actors might exploit. By embracing a holistic EA-based methodology, institutions can craft and implement robust security protocols to safeguard their components and connections. Leveraging EA, our proposed integrated approach aims to forge a comprehensive cybersecurity risk management strategy tailored to the African higher education sector. This strategy seeks to facilitate the identification of critical elements and their intricate interrelationships, thus formulating an effective defence strategy against potential cyber threats. The synergy between EA and cybersecurity within African universities promises to elevate cybersecurity practices, ensure uninterrupted business operations, and fortify the continent's resilience. 
653 |a Higher education 
653 |a Risk management 
653 |a Collaboration 
653 |a Strategy 
653 |a Threats 
653 |a Technology assessment 
653 |a Resilience 
653 |a Business operations 
653 |a Confidentiality 
653 |a Cybersecurity 
653 |a Teaching methods 
653 |a Complex systems 
653 |a Integrated approach 
653 |a Malware 
653 |a Higher education institutions 
653 |a Objectives 
653 |a Risk analysis 
653 |a Educational technology 
653 |a Colleges & universities 
653 |a Credibility 
653 |a Cybercrime 
653 |a Strategies 
653 |a Business 
653 |a Investments 
653 |a Organizational structure 
653 |a Information technology 
653 |a Institutions 
653 |a Integrative approach 
653 |a Interconnections 
653 |a Security 
653 |a Mitigation 
653 |a Academic achievement 
700 1 |a van Vuuren, Joey Jansen  |u Tshwane University of Technology, Pretoria, South Africa 
700 1 |a Leenen, Louise  |u University of the Western Cape and CAIR, Cape Town, South Africa 
773 0 |t International Conference on Cyber Warfare and Security  |g (Mar 2024), p. 501 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3082337046/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3082337046/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3082337046/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch