Mitigating Cyber-Attacks and Threats in South African Commercial Banks

α
Dr. Joel Chigada
Dr. Joel Chigada
σ
Prof Joel Chigada
Prof Joel Chigada
ρ
Tlhologelo Mphahlele
Tlhologelo Mphahlele

Send Message

To: Author

Mitigating Cyber-Attacks and Threats in South African Commercial Banks

Article Fingerprint

ReserarchID

FP4WZ

Mitigating Cyber-Attacks and Threats in South African Commercial Banks Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The increasing incidence of cybercrimes has become a pressing issue for society, businesses, and governments. Responding to the growing demand for digitisation from customers and investors, South African institutions have become targets of sophisticated cyberattacks. The financial sector, considered part of the country’s critical infrastructure, has not been immune. The frequency of attacks on commercial banks in South Africa has risen, with several successful cyberattacks causing substantial harm. This paper explores the interventions commercial banks use in South Africa through a qualitative research lens. The results indicate that while technical interventions provide value, there are still opportunities for improvement in the human and process elements of the interventions. This highlights the need for a holistic approach to cybersecurity, incorporating technology, people, and processes to mitigate the risks posed by cyber threats effectively.

Generating HTML Viewer...

References

118 Cites in Article
  1. (2021). A Resilient Cybersecurity Profession Charts the Path Forward: (ISC) 2 Cybersecurity workforce study.
  2. (2019). Ninth annual cost of cybercrime study unlocking the value of improved cybersecurity protection.
  3. (2020). Insight into the cyber threat landscape in South Africa.
  4. I Agrafiotis,J Nurse,M Goldsmith,S Creese,D Upton (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate.
  5. Bill Albert,Tom Tullis,Donna Tedesco (2009). Case Studies.
  6. D Albert (2020). Why Security Can't Live In A Silo.
  7. Richard Alexander,Srinivas Panguluri (2017). Cybersecurity Terminology and Frameworks.
  8. M Alvarez (2017). IBM increases Internet services.
  9. Robert Armstrong,Jackson Mayo (2009). Leveraging complexity in software for cybersecurity.
  10. Maria Baldassarre,Vita Barletta,Danilo Caivano,Michele Scalera (2020). Integrating security and privacy in software development.
  11. G Banga (2020). How To Ensure Your NIST Cybersecurity Framework Implementation Isn't Too Little, Too Late.
  12. M Barrett (2018). Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
  13. A Bert (2018). 3 reasons gender diversity is crucial to science.
  14. D Blum (2020). Rational Cybersecurity for Business the Security Leaders' Guide to Business Alignment.
  15. Dan Blum (2020). Rational Cybersecurity for Business.
  16. J Boehm,N Curcio,P Merrath,L Shenton,T Stähle (2019). General Model for Understanding Cybersecurity Risk.
  17. Charl Wolhuter,Hannes Van Der Walt,Ferdinand Potgieter,Louisa Meyer,Thapelo Mamiala (2019). What inspires South African student teachers for their future profession?.
  18. D Bourgeios,J Mortati,S Wang,J Smith (2019). Information Systems for Business and Beyond.
  19. L Bramwell (2017). Parliament.
  20. Harmandeep Brar,Gulshan Kumar (2018). Cybercrimes: A Proposed Taxonomy and Challenges.
  21. L Buthelezi (2022). Hawks arrest Absa engineer for alleged theft of R103 million.
  22. D Cabrera,L Cabrera (2018). CONNECTING SILOS: Solving the problem of organizational silos using a simple systems thinking approach.
  23. W Carter (2017). Forces Shaping the Cyber Threat Landscape for Financial Institutions.
  24. Frankie Catota,M Morgan,Douglas Sicker (2018). Cybersecurity incident response capabilities in the Ecuadorian financial sector.
  25. F Catota,M Morgan,D Sicker (2018). Cybersecurity incident response capabilities in the Ecuadorian financial sector.
  26. Mike Chapple,James Stewart,Darril Gibson (2021). CISSP, Eighth Edition.
  27. Zhuming Chen,Yushan Li,Yawen Wu,Junjun Luo (2017). The transition from traditional banking to mobile internet finance: an organizational innovation perspective - a comparative study of Citibank and ICBC.
  28. Kehinde Alade,Abimbola Windapo (2023). Leadership Framework for Sustainable Housing Production in South Africa.
  29. Joel Chigada (2020). A qualitative analysis of the feasibility of deploying biometric authentication systems to augment security protocols of bank card transactions.
  30. J Chigada,M Kyobe (2018). Evaluating Factors Contributing to Misalignment of the South African National Cybeersecurity Policy Framework.
  31. Joel Chigada,Patrick Ngulube (2015). Knowledge management practices at selected banks in South Africa.
  32. Joel Chigada,Rujeko Madzinga (1277). Cyberattacks and threats during COVID-19: A systematic literature review.
  33. J Chigada,N Daniels (2021). Exploring information systems security implications posed by BYOD for a financialservice firm.
  34. Jennifer Cleland (2017). The qualitative orientation in medical education research.
  35. W Copan (2020). A Conversation on the NIST Privacy Framework.
  36. W Cram,Jeffrey Proudfoot,John D’arcy (2020). Maximizing Employee Compliance with Cybersecurity Policies.
  37. J Creswell,V Plano Clark (2017). Designing and Conducting Mixed Methods Research.
  38. John Creswell,Cheryl Poth,Peter Rawlins (2018). Mapping Design Trends and Evolving Directions Using the Sage Handbook of Mixed Methods Research Design.
  39. J Creswell,A Tashakkori (2007). Editorial: The New Era of Mixed Methods.
  40. (2021). Productive Capacities Index country group summary statistics by category.
  41. Adéle Da Veiga,Liudmila Astakhova,Adéle Botha,Marlien Herselman (2020). Defining organisational information security culture—Perspectives from academia and industry.
  42. Adéle Da Veiga,Liudmila Astakhova,Adéle Botha,Marlien Herselman (2020). Defining organisational information security culture—Perspectives from academia and industry.
  43. R Dekkers (2017). Applied Systems Theory.
  44. Deloitte (2022). Cruickshank, David John Ogilvie, (born 20 Feb. 1959), Chairman, Deloitte Global, since 2015 (Chairman, Deloitte UK, 2007–15).
  45. (2022). Cruickshank, David John Ogilvie, (born 20 Feb. 1959), Chairman, Deloitte Global, since 2015 (Chairman, Deloitte UK, 2007–15).
  46. Sagwadi Mabunda (2016). Cyber Extortion, Ransomware and the South African Cybercrimes and Cybersecurity Bill.
  47. Benoît Dupont (2019). The cyber-resilience of financial institutions: significance and applicability.
  48. M Edwards (2020). Facing the Challenge of Aligning Cybersecurity and Business.
  49. (2021). Cybersecurity for SMES Challenges and Recommendations.
  50. George Christou (2016). Network and Information Security and Cyber Defence in the European Union.
  51. Ey Global (2019). Cybercrime. What does the most damage, losing data or trust? Retrieved.
  52. (2019). Acer hit by record ransom.
  53. M Gerhardt,J Nachemson-Ekwall,B Fogel (2022). Harnessing the Power of Age Diversity.
  54. Cynthia Grant,Azadeh Osanloo (2014). Understanding, Selecting, and Integrating a Theoretical Framework in Dissertation Research: Creating the Blueprint for Your “House”.
  55. Tapiwa Gundu,Stephen Flowerday,Karen Renaud (2019). Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}.
  56. Hollard (2017). The new word in insurance: cyber insurance.
  57. (2023). The CIA triad of confidentiality, integrity and availability.
  58. M Himmel,F Grossman (2019). Security on distributed systems: Cloud security versus traditional IT.
  59. Ibm (2021). IBM: 2020 Cyber Resilient Organisation Report.
  60. (2022). ISO 27001 AND THE MANAGEMENT SYSTEM REQUIREMENTS.
  61. (2003). How to become a Bioperl hacker.
  62. (2006). Bank admits to hacking attacks.
  63. F Karlsson,K Hedström,G Goldkuhl (2017). Practice-based discourse analysis of information security policies.
  64. G Lipkin,G Azarenkov (2015). Typical errors in the design and adjustment of control systems in the energy sector.
  65. (2022). Online top 20: data captured using kaspersky lab'S online scanner.
  66. H Keman,P Keri (2019). For What Technology Can't Fix: Building a Model of Organizational Cybersecurity Culture.
  67. Navid Khan,Sarfraz Brohi,Noor Zaman (2020). Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic.
  68. Dejan Kosutic,Federico Pigni (2020). Cybersecurity: investing for competitive outcomes.
  69. Nir Kshetri (2019). Cybercrime and Cybersecurity in Africa.
  70. Jessica Lester,Yonjoo Cho,Chad Lochmiller (2020). Learning to Do Qualitative Data Analysis: A Starting Point.
  71. Ling Li,Wu He,Li Xu,Ivan Ash,Mohd Anwar,Xiaohong Yuan (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior.
  72. Christopher Vandal (2011). Financial Analysis of Lockheed Martin, A Global Leader in Defense Contracting: Managerial Financial Analysis & Strategic Planning.
  73. Sagwadi Mabunda (2019). Cyber Extortion, Ransomware and the South African Cybercrimes and Cybersecurity Bill.
  74. A Malatras,C Skouloudi,A Koukounas (2019). European Union Agency for Network and Information Security (ENISA): European Union Agency for Network and Information Security (ENISA).
  75. Andile Ngcobo,A Nenguda,Jean-Marie Mbuya (2021). The impact of remote work practices on the productivity of public service employees in the gauteng department of education.
  76. Thierry Mbelli,Barry Dwolatzky (2016). Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security.
  77. Neil Mcbride (2005). Chaos theory as a model for interpreting information systems in organizations.
  78. J Mckane (2019). South African banks hit by massive DDoS attack.
  79. A Mcleod,C Dorantes,G Dietrich (2008). Modeling Security Vulnerabilities Using Chaos Theory: Discovering Order, Structure, and Patterns from Chaotic Behavior in Complex Systems.
  80. K Mitnick,W Simon,S Wozniak (2002). The Art of Deception: Controlling the Human Element of Security.
  81. Janice Morse,Michael Barrett,Maria Mayan,Karin Olson,Jude Spiers (2002). Verification Strategies for Establishing Reliability and Validity in Qualitative Research.
  82. A Moyo (2016). The Changing Modus Operandi of the CMO.
  83. Busani Moyo (2018). An analysis of competition, efficiency and soundness in the South African banking sector.
  84. My Broadband (2022). Trans Union faces R10-million fine for hack.
  85. Nedbank (2020). Nedbank warns clients of potential impact of data incident at Computer Facilities (Pty) Ltd.
  86. Wire (2016). Forty million credit card numbers hacked.
  87. Mathias Nielsen,Sharla Alegria,Love Börjeson,Henry Etzkowitz,Holly Falk-Krzesinski,Aparna Joshi,Erin Leahey,Laurel Smith-Doerr,Anita Woolley,Londa Schiebinger (2017). Gender diversity leads to better science.
  88. Miloslava Plachkinova,Ace Vo,Gunjan Batra,Humayun Zafar (2023). Beyond Routine Activity Theory: Towards a Novel Phishing Victimization Theory.
  89. D Ocholla,J Le Roux (2011). Conceptions and misconceptions of theoretical frameworks in library and information science research: a case study of selected theses and dissertations from eastern and southern african universities.
  90. M Oiaga (2006). Three South African Banks Hit by Hackers.
  91. (2017). Information technology. The Open Group Service Integration Maturity Model (OSIMM).
  92. R Padayachee,V Pillay (2018). Figure 14.2. Women remain under-represented in parliaments, and progress is slow in many OECD countries.
  93. (2022). WHAT IS THE PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)?.
  94. Dominique Bowers,Ntswaki Matlala,Moegamat Berhadien,Henry Umetor,Thabo Gongxeka (2019). SUSTAINABLE SUPPLY CHAIN MANAGEMENT AND DISRUPTIVE THEORY: A BIBLIOMETRIC REVIEW.
  95. D Potgieter (2011). Absa intercepts Land Bank swindle.
  96. T Ramluckan,B Van Niekerk,L Leenen (2020). Cybersecurity and information warfare research in South Africa: Challenges and proposed solutions.
  97. Dhanasekar Elumalai (2009). The Role of Chaos Engineering in DevSecOps Strengthening Security and Compliance in Agile.
  98. Sizwe Snail Ka Mtuze (2013). THE CONVERGENCE OF LEGISLATION ON CYBERCRIME AND DATA PROTECTION IN SOUTH AFRICA: A Practical Approach to the Cybercrimes Act 19 of 2020 and the Protection of Personal Information Act 4 of 2013.
  99. Kruger Petronell,Moyo Khulekani,Mudau Paul,Pieterse Marius,Spies Amanda (2015). Republic of South Africa: Legal Response to Covid-19.
  100. G Rossman,S Rallis (2017). An Introduction to Qualitative Research.
  101. H Salim,S Madnick (2016). Cyber Safety: A Systems Theory Approach to Managing Cyber Security Risks -Applied to TJX Cyber Attack.
  102. M Saunders,P Lewis,A Thornhill (2009). Research Methods for Business Students.
  103. W Simbanegavi,J Greenberg,T Gwatidzo (2015). Testing for Competition in the South African Banking Sector.
  104. J Sinnot,J Rabin,K Smith,A Jones,L Johnson,L Smith (2012). Examination of cybercrime and its effects on corporate stock value.
  105. (2020). Research Department - General Economic Conditions - Letters to the Reserve Banks - Letters to South African Reserve Bank - File 4 - 1934.
  106. Jose Such,Pierre Ciholas,Awais Rashid,John Vidler,Timothy Seabrook (2019). Basic Cyber Hygiene: Does It Work?.
  107. E Sutherland (2017). Governance of Cybersecurity - The Case of South Africa.
  108. W Swart,M Wa Afrika (2012). It was a happy New Year's Day for gang who pulled off.
  109. W Thompson,T Farber (2020). Absa says 'some sensitive customer information' stolen by employee.
  110. S Tisdale (2015). CYBERSECURITY: CHALLENGES FROM A SYSTEMS, COMPLEXITY, KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE PERSPECTIVE.
  111. J Turner,R Baker (2019). Complexity Theory: An Overview with Potential Applications for the Social Sciences.
  112. Betsy Uchendu,Jason Nurse,Maria Bada,Steven Furnell (2021). Developing a cyber security culture: Current practices and future needs.
  113. B Van Niekerk (2017). An Analysis of Cyber-Incidents in South Africa.
  114. P Vecchiatto (2003). Hack not to blame in new Absa fraud case.
  115. Shuang Wang,Lei Ding,He Sui,Zhaojun Gu (2021). Cybersecurity risk assessment method of ICS based on attack-defense tree model.
  116. L Wilkinson (0310). Seeking Foundations for the Science of Cyber Security: Editorial for Special Issue of Information Systems Frontiers.
  117. K Zetter (2015). Hackers Finally Post Stolen Ashley Madison Data | WIRED. Hackers Finally Post Stolen Ashley Madison Data.
  118. Y Zhang,Y Xiao,K Ghaboosi,J Zhang,H Deng (2012). A survey of cyber crimes.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Dr. Joel Chigada. 2026. \u201cMitigating Cyber-Attacks and Threats in South African Commercial Banks\u201d. Global Journal of Computer Science and Technology - G: Interdisciplinary GJMBR-G Volume 24 (GJMBR Volume 24 Issue G1): .

Download Citation

Cybersecurity risks in South African banks combating cyber-attacks and threats.
Issue Cover
GJMBR Volume 24 Issue G1
Pg. 43- 57
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

January 6, 2025

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 856
Total Downloads: 42
2026 Trends
Related Research

Published Article

The increasing incidence of cybercrimes has become a pressing issue for society, businesses, and governments. Responding to the growing demand for digitisation from customers and investors, South African institutions have become targets of sophisticated cyberattacks. The financial sector, considered part of the country’s critical infrastructure, has not been immune. The frequency of attacks on commercial banks in South Africa has risen, with several successful cyberattacks causing substantial harm. This paper explores the interventions commercial banks use in South Africa through a qualitative research lens. The results indicate that while technical interventions provide value, there are still opportunities for improvement in the human and process elements of the interventions. This highlights the need for a holistic approach to cybersecurity, incorporating technology, people, and processes to mitigate the risks posed by cyber threats effectively.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Mitigating Cyber-Attacks and Threats in South African Commercial Banks

Prof Joel Chigada
Prof Joel Chigada
Tlhologelo Mphahlele
Tlhologelo Mphahlele

Research Journals