Institutional Repository

A critical review of the implementation of the security threat assessment by a selection of government department in Gauteng

Show simple item record

dc.contributor.advisor Lekubu, Bernard Khotso
dc.contributor.author Mahlatsi, Lehlohonolo Wonderboy
dc.date.accessioned 2023-06-27T11:21:18Z
dc.date.available 2023-06-27T11:21:18Z
dc.date.issued 2022-11
dc.identifier.uri https://hdl.handle.net/10500/30200
dc.description.abstract The imperative for protecting critical national infrastructure has engendered development of the Security Threat Assessment Framework that is implemented by the South African government under the guidance of the State Security Agency (SSA). The objective of the STRA Security Threat Assessment Framework is to detect any weaknesses in existing security measures, and to recommend strategies to evaluate ameliorative improvements in those identified weaknesses. The aim of the study is to critically review the implementation of the security threat assessment by a selection of government Department in Gauteng. The study has adopted a qualitative research design approach due to its constructivist-interpretivist inspiration and reliance on participant-centred mode of acquiring the study’s pertinent primary data through document analysis, semi-structured in-depth interviews with the primary participants, and observations with secondary participants. The study population comprised of security managers, vetting managers, cybercrime managers, information security managers, physical security managers, and professionals in the security environment. Additionally, the target population and sample size consisted of 47 participants from various spheres of the security sector locally. These participants were selected through the purposive and simple random sampling strategies respectively. Some of the study’s critical findings show that there was general awareness and knowledgeability concerning the appointment processes and roles of security managers and security committees. The role of technology was viewed as beneficial. As such, the security of sensitive information necessitated that personnel working in high-risk environments as well as personnel in charge of information technology systems should be subjected to security procedures. These procedures include declaration of secrecy, security profile checks of each user, limiting access to top secret to individuals nearing retirement or exiting the system; as well as backup of the sensitive information in case it may be tampered with. en
dc.format.extent 1 online resource (xii, 248 leaves) : color illustrations, color graph en
dc.language.iso en en
dc.subject Threat en
dc.subject Risk en
dc.subject Vulnerability en
dc.subject Legal mandate en
dc.subject Exploit en
dc.subject Impact en
dc.subject Information security en
dc.subject South African Government Departments en
dc.subject Cybersecurity en
dc.subject Counter-intelligence en
dc.subject Classified information en
dc.subject.ddc 352.379096822
dc.subject.lcsh National security -- South Africa -- Gauteng -- Evaluation en
dc.subject.lcsh Public utilities – Protection -- South Africa -- Gauteng -- Evaluation en
dc.subject.lcsh Terrorism -- South Africa -- Gauteng -- Prevention -- Evaluation en
dc.subject.lcsh Computer networks -- Security measures -- South Africa -- Gauteng -- Evaluation en
dc.subject.lcsh Computer security -- Government policy -- South Africa -- Gauteng -- Evaluation en
dc.subject.other UCTD
dc.title A critical review of the implementation of the security threat assessment by a selection of government department in Gauteng en
dc.type Thesis en
dc.description.department Police Practice en
dc.description.degree D. Litt. et Phil. (Criminal Justice)


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics