Advertisement

CII Protection - Lessons for Developing Countries: South Africa as a Case Study

  • Mboneli Ndlangisa
  • Deon Herbst
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6027)

Abstract

We explore the process followed in formulating the South African CII (Critical Information Infrastructure) identification criteria and its application. We report on a three pronged approach that defines National Security, severity of CII security incidents and roles and responsibilities for CII protection. Our Criteria assumes the existence of basic ICT security roles within a country as per application of the South African criteria and its suitability for a country with limited resources. We conclude by recommending a CII protection approach that is best suited for developing countries based on our experiences.

Keywords

National Security Critical Infrastructures Critical Information Infrastructures South African CII Identification Criteria 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dunn, M., Wigert, I.: The International CIIP Handbook 2004: An Inventory and Analysis of Protection Policies in Fourteen Countries, Centre for Security Studies (2004)Google Scholar
  2. 2.
    Suter, M.: A Generic National Framework For Critical Information Infrastructure Protection (CIIP) By Manuel Suter, Center for Security Studies, ETH Zurich (2007), http://www.itu.int/ITU-D/cyb/cybersecurity/docs/generic-national-framework-for-ciip.pdf
  3. 3.
    Dunn, M.: The socio-political dimensions of critical information infrastructure protection (CIIP). Int. J. Critical Infrastructures 1(2/3), 258–268 (2005)CrossRefGoogle Scholar
  4. 4.
    Electronic Communications Security Pty (Ltd) Act (Act 68 of (2002), http://www.info.gov.za/view/DownloadFileAction?id=68106
  5. 5.
    Electronic Communications and Transactions Act (Act 25 of 2002), http://www.acts.co.za/ect_act/
  6. 6.
  7. 7.
    Draft ITU National Cyber security/CIIP Self-Assessment Tool (2008), http://www.itu.int/ITU-D/cyb/cybersecurity/projects/readiness.html
  8. 8.
    Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Complex networks identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine 21(6), 11–25 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Mboneli Ndlangisa
    • 1
  • Deon Herbst
    • 1
  1. 1.ISCOTRAPretoriaSouth Africa

Personalised recommendations