Please use this identifier to cite or link to this item:
https://etd.cput.ac.za/handle/20.500.11838/3975
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Mwansa, Laban | en_US |
dc.contributor.advisor | Rocaries, Francois | en_US |
dc.contributor.author | Ncubukezi, Tabisa | en_US |
dc.date.accessioned | 2024-01-29T07:36:04Z | - |
dc.date.available | 2024-01-29T07:36:04Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | https://etd.cput.ac.za/handle/20.500.11838/3975 | - |
dc.description | Thesis (DEng (Electrical Engineering))--Cape Peninsula University of Technology, 2023 | en_US |
dc.description.abstract | The increased convenient use and the openness of cyberspace increased cyberrisks in all institutions. The cybercriminals use innovative ways to gain unauthorised access to systems and leave them vulnerable to cyberthreats and cyberattacks. The common cyberthreats range from intrusion, ransomware, fraud, unauthorized access and modification of information, malicious codes, and denial of service. The exposure of small and medium-sized enterprises (SME) to these cyber attacks compromises business and information systems. When cyber attacks materialize they pose risks that impact SME’s business continuity client trust, economic growth and performance. This study designed, developed and evaluated cyberrisk tools for SMEs in South Africa using AgenaRisk package with artificial intelligence (AI) capabilities through the Bayesian network tools. Within the qualitative approach, the study purposive sampling to select 45 respondents (females and males) from the businesses that operated during the Covid-19 pandemic. Data were collected using a questionnaire deployed in Google Forms. The research gathered qualitative and quantitative data about the existing cybersecurity risks, their impact, likelihood and current protection measures. The collected data were analysed and interpreted using thematic analysis and descriptive statistics. In addition, the study used quantitative risk assessment using the modelling and analytical techniques to perform sensitivity analysis, scenario analysis, Tornado graphs, decision trees, and expected monetary value. Lastly, the work adopted the NIST framework to align with the existing cybersecurity controls to improve cybersecurity, employee awareness, and training, aiding the extensive implementation of cybersecurity. The results indicated that all small businesses have been affected by different cyberthreats and cyberattacks that compromise the entire information systems resulting in cyberrisks. Some risks are planned and some are unplanned. Even though some SMEs implemented mitigation measures, the extent of their usage and implementation still needs to be improved. Simulated cases demonstrated different threat levels, which ultimately led to unauthorised information being accessed These different cases act as a clear guide showing the threat level, its impact and the risk likelihood. The framework shared insights about cybersecurity risk management and highlighted the strategies to promote the use of cyberspace and improve secure surfing. The developed risk tool illustrated the risk likelihood and the risk impact based on the key dependent and independent variables, prior indicators, as well as posterior indicators. Cyberrisk models demonstrated possible risks that SMEs are exposed to, different connected variables that determined the risk likelihood of the uncertain variables and the risk impact. Recommendations to improve the state of cybersecurity in the context of SMEs were made, followed by suggestions for future work and a conclusion. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Cape Peninsula University of Technology | en_US |
dc.subject | Computer security | en_US |
dc.subject | Cyber intelligence (Computer security) | en_US |
dc.subject | Small business -- Computer networks -- Safety measures | en_US |
dc.subject | Cyberspace -- Security measures | en_US |
dc.subject | Information technology -- Security measures | en_US |
dc.title | Design development and evaluation of the cybersecurity risk tool: a case of small and medium-sized enterprises in South Africa | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Electrical, Electronic and Computer Engineering - Doctoral Degree |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Ncubukezi_Tabisa_208217673.pdf | 6.24 MB | Adobe PDF | View/Open |
Page view(s)
528
Last Week
75
75
Last month
80
80
checked on Nov 19, 2024
Download(s)
370
checked on Nov 19, 2024
Google ScholarTM
Check
Items in Digital Knowledge are protected by copyright, with all rights reserved, unless otherwise indicated.