PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS) IN SOUTH AFRICA

South Africa has made great strides towards protecting critical information infrastructures (CIIs). For example, South Africa recognises the significance of safeguarding places or areas that are essential to the national security of South Africa or the economic and social well-being of South African...

Full description

Bibliographic Details
Main Author: Mzukisi N Njotini
Format: Article
Language:Afrikaans
Published: North-West University 2013-04-01
Series:Potchefstroom Electronic Law Journal
Subjects:
Online Access:http://www.nwu.ac.za/webfm_send/63107
id doaj-25908272d4bd4c9f81c1da02a6f25c04
record_format Article
spelling doaj-25908272d4bd4c9f81c1da02a6f25c042020-11-25T01:19:21ZafrNorth-West UniversityPotchefstroom Electronic Law Journal1727-37812013-04-01161450481http://dx.doi.org/10.4314/pelj.v16i1.14PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS) IN SOUTH AFRICAMzukisi N NjotiniSouth Africa has made great strides towards protecting critical information infrastructures (CIIs). For example, South Africa recognises the significance of safeguarding places or areas that are essential to the national security of South Africa or the economic and social well-being of South African citizens. For this reason South Africa has established mechanisms to assist in preserving the integrity and security of CIIs. The measures provide inter alia for the identification of CIIs; the registration of the full names, address and contact details of the CII administrators (the persons who manage CIIs); the identification of the location(s) of CIIs or their component parts; and the outlining of the general descriptions of information or data stored in CIIs.It is argued that the measures to protect CIIs in South Africa are inadequate. In particular, the measures rely on a one-size-fits-all approach to identify and classify CIIs. For this reason the South African measures are likely to lead to the adoption of a paradigm that considers every infrastructure, data or database, regardless of its significance or importance, to be key or critical. http://www.nwu.ac.za/webfm_send/63107Critical databasescritical information infrastructuresnational securitysocial and economic well-being
collection DOAJ
language Afrikaans
format Article
sources DOAJ
author Mzukisi N Njotini
spellingShingle Mzukisi N Njotini
PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS) IN SOUTH AFRICA
Potchefstroom Electronic Law Journal
Critical databases
critical information infrastructures
national security
social and economic well-being
author_facet Mzukisi N Njotini
author_sort Mzukisi N Njotini
title PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS) IN SOUTH AFRICA
title_short PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS) IN SOUTH AFRICA
title_full PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS) IN SOUTH AFRICA
title_fullStr PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS) IN SOUTH AFRICA
title_full_unstemmed PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS) IN SOUTH AFRICA
title_sort protecting critical databases – towards a risk-based assessment of critical information infrastructures (ciis) in south africa
publisher North-West University
series Potchefstroom Electronic Law Journal
issn 1727-3781
publishDate 2013-04-01
description South Africa has made great strides towards protecting critical information infrastructures (CIIs). For example, South Africa recognises the significance of safeguarding places or areas that are essential to the national security of South Africa or the economic and social well-being of South African citizens. For this reason South Africa has established mechanisms to assist in preserving the integrity and security of CIIs. The measures provide inter alia for the identification of CIIs; the registration of the full names, address and contact details of the CII administrators (the persons who manage CIIs); the identification of the location(s) of CIIs or their component parts; and the outlining of the general descriptions of information or data stored in CIIs.It is argued that the measures to protect CIIs in South Africa are inadequate. In particular, the measures rely on a one-size-fits-all approach to identify and classify CIIs. For this reason the South African measures are likely to lead to the adoption of a paradigm that considers every infrastructure, data or database, regardless of its significance or importance, to be key or critical.
topic Critical databases
critical information infrastructures
national security
social and economic well-being
url http://www.nwu.ac.za/webfm_send/63107
work_keys_str_mv AT mzukisinnjotini protectingcriticaldatabasestowardsariskbasedassessmentofcriticalinformationinfrastructuresciisinsouthafrica
_version_ 1725138778909048832