The Cyber-Security State of our Nation: A Critique of South Africa's Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure

被引:0
|
作者
Mohideen, Feroze [1 ]
机构
[1] Univ Johannesburg, Auckland Pk, South Africa
关键词
sensitive; critical information infrastructure protection (CIIP); public; private partnerships;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The society we live in faces many technological challenges on a daily basis, especially in developing nations such as South Africa. One such challenge is that of protecting critical information infrastructure (CII) and sensitive, mission critical information. A huge role player in the protection of these two vital components of sustainable development is the private sector. Much of a nations CII is owned, operated and maintained by the private sector. However, the responsibility of setting goals to protect a nations CII and sensitive, mission critical information is that of the government's. Protecting CII can be seen as being very difficult and there are many influencing factors. There are many barriers that prevent the adequate protection of CII within a developing country such as South Africa. This paper will attempt to identify key contributing factors and barriers to the lack of cyber-security around CII, the need and lack of public private partnerships to protect CII, a critique of the publicly available South African National Cyber-Security Policy Framework as well as the recently released CyberCrimes and Cyber-Security bill. The paper concludes by applying academic research with professional knowledge and experience in order to present a few recommendations to both the government and private sector regarding the protection of CII in South Africa.
引用
收藏
页码:235 / 243
页数:9
相关论文
共 50 条
  • [1] Critical Infrastructure Cyber-Security Risk Management
    Spyridopoulos, Theodoros
    Maraslis, Konstantinos
    Tryfonas, Theo
    Oikonomou, George
    [J]. TERRORISTS' USE OF THE INTERNET: ASSESSMENT AND RESPONSE, 2017, 136 : 59 - 76
  • [2] On Cyber-Security of Information Systems
    Sneps-Sneppe, Manfred
    Sukhomlin, Vladimir
    Namiot, Dmitry
    [J]. DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
  • [3] Cyber-Security and Governance for ICS/SCADA in South Africa
    Pretorius, Barend
    van Niekerk, Brett
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 241 - 251
  • [4] Cyber-security: Who will provide protection?
    ViaSat, United Kingdom
    [J]. Comput. Fraud Secur., 12 (19-20): : 19 - 20
  • [5] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [6] A Framework of Cyber-Security Protection for Warship Systems
    Lv Yunfei
    Chen Yuanbao
    Wang Xuan
    Li Xuan
    Zhang Qi
    [J]. PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 17 - 20
  • [7] Virtual Cyber-Security Testing Capability for large scale distributed information infrastructure protection
    Pederson, Perry
    Lee, David
    Shu, Guoqiang
    Chen, Dongluo
    Liu, Zhijun
    Li, Na
    Sang, Lifeng
    [J]. 2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 372 - +
  • [8] Towards a General Information Security Management Assessment Framework to Compare Cyber-Security of Critical Infrastructure Organizations
    Bernroider, Edward W. N.
    Margiol, Sebastian
    Taudes, Alfred
    [J]. RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS, 10TH IFIP WG 8.9 WORKING CONFERENCE, CONFENIS 2016, 2016, 268 : 127 - 141
  • [9] Cyber-Security Issues in Healthcare Information Technology
    Steve G. Langer
    [J]. Journal of Digital Imaging, 2017, 30 : 117 - 125
  • [10] Cyber-Security Issues in Healthcare Information Technology
    Langer, Steve G.
    [J]. JOURNAL OF DIGITAL IMAGING, 2017, 30 (01) : 117 - 125