{"title":"Integrating Enterprise Architecture into Cybersecurity Risk Management in Higher Education","authors":"Mafika Nkambule, Joey Jansen van Vuuren","doi":"10.34190/iccws.19.1.2189","DOIUrl":null,"url":null,"abstract":"Cybercriminals constantly seek new methods to infiltrate a company's defences, making cybersecurity investments essential. Enterprise architecture (EA) provides a systematic risk detection and mitigation process by emphasising the interdependencies between systems, data, processes, people, and other factors. This paper provides a comprehensive approach, also referred to as a process, based on EA to assist African universities in developing a comprehensive cybersecurity plan. The EA process comprises four pillars: business architecture, data architecture, application architecture, and technology architecture. African universities can develop a comprehensive cybersecurity strategy using an EA approach in cybersecurity to achieve institutional goals and objectives. The potential attack surface comprises isolated EA components and their interconnections.This article comprehensively examines various EA processes such as business, information, application, and technology architecture. These processes are carefully analysed to evaluate the organisational structures and uncover opportunities to enhance security protocols. Additionally, we delve deep into abstract security patterns, seeking to cultivate an environment of trustworthiness within complex systems. Our research findings underscore the significant potential within African higher education institutions. By embracing a model-based approach to risk analysis and mitigation, these institutions can fortify their cybersecurity defences to ensure uninterrupted business operations and enhance overall resilience in the face of evolving security challenges.When we combine EA and information security (ICS), we uncover many vulnerabilities malicious actors might exploit. By embracing a holistic EA-based methodology, institutions can craft and implement robust security protocols to safeguard their components and connections. Leveraging EA, our proposed integrated approach aims to forge a comprehensive cybersecurity risk management strategy tailored to the African higher education sector. This strategy seeks to facilitate the identification of critical elements and their intricate interrelationships, thus formulating an effective defence strategy against potential cyber threats. The synergy promises to elevate cybersecurity practices, ensure uninterrupted business operations, and fortify the continent's resilience.","PeriodicalId":429427,"journal":{"name":"International Conference on Cyber Warfare and Security","volume":"227 S722","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Cyber Warfare and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34190/iccws.19.1.2189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cybercriminals constantly seek new methods to infiltrate a company's defences, making cybersecurity investments essential. Enterprise architecture (EA) provides a systematic risk detection and mitigation process by emphasising the interdependencies between systems, data, processes, people, and other factors. This paper provides a comprehensive approach, also referred to as a process, based on EA to assist African universities in developing a comprehensive cybersecurity plan. The EA process comprises four pillars: business architecture, data architecture, application architecture, and technology architecture. African universities can develop a comprehensive cybersecurity strategy using an EA approach in cybersecurity to achieve institutional goals and objectives. The potential attack surface comprises isolated EA components and their interconnections.This article comprehensively examines various EA processes such as business, information, application, and technology architecture. These processes are carefully analysed to evaluate the organisational structures and uncover opportunities to enhance security protocols. Additionally, we delve deep into abstract security patterns, seeking to cultivate an environment of trustworthiness within complex systems. Our research findings underscore the significant potential within African higher education institutions. By embracing a model-based approach to risk analysis and mitigation, these institutions can fortify their cybersecurity defences to ensure uninterrupted business operations and enhance overall resilience in the face of evolving security challenges.When we combine EA and information security (ICS), we uncover many vulnerabilities malicious actors might exploit. By embracing a holistic EA-based methodology, institutions can craft and implement robust security protocols to safeguard their components and connections. Leveraging EA, our proposed integrated approach aims to forge a comprehensive cybersecurity risk management strategy tailored to the African higher education sector. This strategy seeks to facilitate the identification of critical elements and their intricate interrelationships, thus formulating an effective defence strategy against potential cyber threats. The synergy promises to elevate cybersecurity practices, ensure uninterrupted business operations, and fortify the continent's resilience.
网络犯罪分子不断寻求新的方法来渗透公司的防御系统,因此网络安全投资至关重要。企业架构(EA)通过强调系统、数据、流程、人员和其他因素之间的相互依存关系,提供了一个系统化的风险检测和缓解流程。本文提供了一种基于 EA 的综合方法(也称为流程),以帮助非洲大学制定全面的网络安全计划。EA 流程包括四大支柱:业务架构、数据架构、应用架构和技术架构。非洲大学可利用 EA 网络安全方法制定全面的网络安全战略,以实现机构目标和目的。潜在的攻击面包括孤立的 EA 组件及其相互联系。本文全面研究了各种 EA 流程,如业务、信息、应用和技术架构。本文全面研究了各种 EA 流程,如业务、信息、应用和技术架构,并对这些流程进行了仔细分析,以评估组织结构并发现增强安全协议的机会。此外,我们还深入研究了抽象的安全模式,力求在复杂的系统中营造一个值得信赖的环境。我们的研究成果强调了非洲高等教育机构的巨大潜力。通过采用基于模型的方法进行风险分析和缓解,这些机构可以加强网络安全防御,确保业务运营不中断,并在面对不断变化的安全挑战时增强整体应变能力。当我们将 EA 与信息安全(ICS)相结合时,我们发现了许多恶意行为者可能利用的漏洞。通过采用基于 EA 的整体方法,机构可以制定并实施强大的安全协议,以保护其组件和连接。利用 EA,我们提出的综合方法旨在为非洲高等教育部门量身打造全面的网络安全风险管理战略。该战略旨在促进识别关键要素及其错综复杂的相互关系,从而制定有效的防御战略来应对潜在的网络威胁。协同作用有望提升网络安全实践,确保业务运营不中断,并加强非洲大陆的复原力。