Abstract
We explore the process followed in formulating the South African CII (Critical Information Infrastructure) identification criteria and its application. We report on a three pronged approach that defines National Security, severity of CII security incidents and roles and responsibilities for CII protection. Our Criteria assumes the existence of basic ICT security roles within a country as per application of the South African criteria and its suitability for a country with limited resources. We conclude by recommending a CII protection approach that is best suited for developing countries based on our experiences.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Dunn, M., Wigert, I.: The International CIIP Handbook 2004: An Inventory and Analysis of Protection Policies in Fourteen Countries, Centre for Security Studies (2004)
Suter, M.: A Generic National Framework For Critical Information Infrastructure Protection (CIIP) By Manuel Suter, Center for Security Studies, ETH Zurich (2007), http://www.itu.int/ITU-D/cyb/cybersecurity/docs/generic-national-framework-for-ciip.pdf
Dunn, M.: The socio-political dimensions of critical information infrastructure protection (CIIP). Int. J. Critical Infrastructures 1(2/3), 258–268 (2005)
Electronic Communications Security Pty (Ltd) Act (Act 68 of (2002), http://www.info.gov.za/view/DownloadFileAction?id=68106
Electronic Communications and Transactions Act (Act 25 of 2002), http://www.acts.co.za/ect_act/
National Key Points Act (Act 102 of 1980), http://www.midvaal.gov.za/LinkClick.aspx?link=NATIONAL+KEY+POINTS+ACT+102+OF+1980.doc&tabid=259&mid=893
Draft ITU National Cyber security/CIIP Self-Assessment Tool (2008), http://www.itu.int/ITU-D/cyb/cybersecurity/projects/readiness.html
Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Complex networks identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine 21(6), 11–25 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ndlangisa, M., Herbst, D. (2010). CII Protection - Lessons for Developing Countries: South Africa as a Case Study. In: Rome, E., Bloomfield, R. (eds) Critical Information Infrastructures Security. CRITIS 2009. Lecture Notes in Computer Science, vol 6027. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14379-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-14379-3_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14378-6
Online ISBN: 978-3-642-14379-3
eBook Packages: Computer ScienceComputer Science (R0)