z-logo
open-access-imgOpen Access
Protecting Critical Databases – Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa
Author(s) -
Mzukisi Niven Njotini
Publication year - 2013
Publication title -
per
Language(s) - English
Resource type - Journals
ISSN - 1727-3781
DOI - 10.4314/pelj.v16i1.14
Subject(s) - safeguarding , identification (biology) , computer science , computer security , business , internet privacy , database , medicine , botany , nursing , biology
South Africa has made great strides towards protecting critical information infrastructures (CIIs). For example, South Africa recognises the significance of safeguarding places or areas that are essential to the national security of South Africa or the economic and social well-being of South African citizens. For this reason South Africa has established mechanisms to assist in preserving the integrity and security of CIIs. The measures provide inter alia for the identification of CIIs; the registration of the full names, address and contact details of the CII administrators (the persons who manage CIIs); the identification of the location(s) of CIIs or their component parts; and the outlining of the general descriptions of information or data stored in CIIs.It is argued that the measures to protect CIIs in South Africa are inadequate. In particular, the measures rely on a one-size-fits-all approach to identify and classify CIIs. For this reason the South African measures are likely to lead to the adoption of a paradigm that considers every infrastructure, data or database, regardless of its significance or importance, to be key or critical

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here