Protecting Critical Databases – Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa
South Africa has made great strides towards protecting critical information
infrastructures (CIIs). For example, South Africa recognises the significance of safeguarding places or areas that are essential to the national security of South Africa or the economic and social well-being of South African citizens. For this reason South Africa has established mechanisms to assist in preserving the integrity and security of CIIs. The measures provide inter alia for the identification of CIIs; the registration of the full names, address and contact details of the CII administrators (the persons who manage CIIs); the identification of the location(s) of CIIs or their component parts; and the outlining of the general descriptions of information or data stored in CIIs.
It is argued that the measures to protect CIIs in South Africa are inadequate. In particular, the measures rely on a one-size-fits-all approach to identify and classify CIIs. For this reason the South African measures are likely to lead to the adoption of a paradigm that considers every infrastructure, data or database, regardless of its significance or importance, to be key or critical.
KEYWORDS: Critical databases; critical information infrastructures; national
security; social and economic well-being
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in all material published in PER/PELJ vests in the author, provided that authors grant, by submission of their contributions, permission that their contributions may be shared and adapted without restriction. An author furthermore agrees that the same contribution may not be published elsewhere without the written permission of the editor.
Anyone gaining access, electronically or otherwise, to a contribution to PER, may quote from such contribution, use the intellectual content thereof, share and adapt it, but subject to the following conditions:
you must give appropriate credit, provide a link and indicate if changes were made; and
the copyright of the author(s) may not be infringed in any way.