Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon been crossed?

Basie Von Solms, Elmarie Kritzinger

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

This paper reviews some very negative views, made over the last few years, about Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa. The paper addresses the expressed negative views that Africa can become the vehicle or platform from where cyber-attacks could be launched against the rest of the world. The paper evaluates the reasons for such negative views and then suggests some steps which should be taken in Africa to counter such negative impressions and to protect itself cyber wise.

Original languageEnglish
Title of host publicatione-Infrastructure and e-Services for Developing Countries - Third International ICST Conference, AFRICOMM 2011, Revised Selected Papers
Pages116-124
Number of pages9
DOIs
Publication statusPublished - 2012
Event3rd International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2011 - Zanzibar, Tanzania, United Republic of
Duration: 23 Nov 201124 Nov 2011

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume92 LNICST
ISSN (Print)1867-8211

Conference

Conference3rd International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2011
Country/TerritoryTanzania, United Republic of
CityZanzibar
Period23/11/1124/11/11

Keywords

  • Africa
  • Critical Information Infrastructure Protection
  • Cyber Security

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon been crossed?'. Together they form a unique fingerprint.

Cite this