Skip to main content

CII Protection - Lessons for Developing Countries: South Africa as a Case Study

  • Conference paper
Book cover Critical Information Infrastructures Security (CRITIS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6027))

  • 1491 Accesses

Abstract

We explore the process followed in formulating the South African CII (Critical Information Infrastructure) identification criteria and its application. We report on a three pronged approach that defines National Security, severity of CII security incidents and roles and responsibilities for CII protection. Our Criteria assumes the existence of basic ICT security roles within a country as per application of the South African criteria and its suitability for a country with limited resources. We conclude by recommending a CII protection approach that is best suited for developing countries based on our experiences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dunn, M., Wigert, I.: The International CIIP Handbook 2004: An Inventory and Analysis of Protection Policies in Fourteen Countries, Centre for Security Studies (2004)

    Google Scholar 

  2. Suter, M.: A Generic National Framework For Critical Information Infrastructure Protection (CIIP) By Manuel Suter, Center for Security Studies, ETH Zurich (2007), http://www.itu.int/ITU-D/cyb/cybersecurity/docs/generic-national-framework-for-ciip.pdf

  3. Dunn, M.: The socio-political dimensions of critical information infrastructure protection (CIIP). Int. J. Critical Infrastructures 1(2/3), 258–268 (2005)

    Article  Google Scholar 

  4. Electronic Communications Security Pty (Ltd) Act (Act 68 of (2002), http://www.info.gov.za/view/DownloadFileAction?id=68106

  5. Electronic Communications and Transactions Act (Act 25 of 2002), http://www.acts.co.za/ect_act/

  6. National Key Points Act (Act 102 of 1980), http://www.midvaal.gov.za/LinkClick.aspx?link=NATIONAL+KEY+POINTS+ACT+102+OF+1980.doc&tabid=259&mid=893

  7. Draft ITU National Cyber security/CIIP Self-Assessment Tool (2008), http://www.itu.int/ITU-D/cyb/cybersecurity/projects/readiness.html

  8. Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Complex networks identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine 21(6), 11–25 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ndlangisa, M., Herbst, D. (2010). CII Protection - Lessons for Developing Countries: South Africa as a Case Study. In: Rome, E., Bloomfield, R. (eds) Critical Information Infrastructures Security. CRITIS 2009. Lecture Notes in Computer Science, vol 6027. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14379-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14379-3_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14378-6

  • Online ISBN: 978-3-642-14379-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics