scholarly journals Cybersecurity Policy and the Legislative Context of the Water and Wastewater Sector in South Africa

2020 ◽  
Vol 13 (1) ◽  
pp. 291
Author(s):  
Masike Malatji ◽  
Annlizé L. Marnewick ◽  
Suné von Solms

The water and wastewater sector is an important lifeline upon which other economic sectors depend. Securing the sector’s critical infrastructure is therefore important for any country’s economy. Like many other nations, South Africa has an overarching national cybersecurity strategy aimed at addressing cyber terrorism, cybercriminal activities, cyber vandalism, and cyber sabotage. The aim of this study is to contextualise the water and wastewater sector’s cybersecurity responsibilities within the national cybersecurity legislative and policy environment. This is achieved by conducting a detailed analysis of the international, national and sector cybersecurity stakeholders; legislation and policies; and challenges pertaining to the protection of the water and wastewater sector. The study found some concerning challenges and improvement gaps regarding the complex manner in which the national government is implementing the cybersecurity strategy. The study also found that, along with the National Cybersecurity Policy Framework (the national cybersecurity strategy of South Africa), the Electronic Communications and Transactions Act, Critical Infrastructure Protection Act, and other supporting legislation and policies make provision for the water and wastewater sector’s computer security incidents response team to be established without the need to propose any new laws or amend existing ones. This is conducive for the immediate development of the sector-specific cybersecurity governance framework and resilience strategy to protect the water and wastewater assets.

Author(s):  
Bellarmine Ezumah ◽  
Suraj Olunifesi Adekunle

This chapter serves as a collection of works that were done in the area of cybersecurity in Africa—with a focus on four countries representing the cardinal points in Africa: Kenya, Nigeria, Egypt, and South Africa. It presents detailed information on the legislative framework proposed and implemented by these countries to combat and control cybercrimes. Notable among them are the Egypt’s e-Signature Law 15, Kenya’s e-Transaction Bill, Nigeria’s Computer Security and Critical Information Infrastructure Protection Bill, and South Africa’s Electronic Communications and Transaction Act. Equally, these legislative measures were commended, criticized, and factors that militate their implementation are discussed. The ultimate realization is that cybercrime can never be abolished; rather, every effort aims at combating and controlling it in some way. Finally, the chapter posits areas that the African nations can improve in their quest for making cyberspace safer.


2014 ◽  
pp. 1583-1597
Author(s):  
Joey Jansen van Vuuren ◽  
Louise Leenen ◽  
Jackie Phahlamohlaka ◽  
Jannie Zaaiman

A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical infrastructure that needs to be safeguarded and protected. Although the South African government approved a draft National Cyber Security Policy Framework in March 2012, the country still needs a national cybersecurity governance structure in order to effectively control and protect its cyber infrastructure. Whilst various structures have been established to deal with cybersecurity in South Africa, they are inadequate and implementation of the policy is still in the very early stages. Structures need to be in place to set the security controls and policies and also to govern their implementation. It is important to have a holistic approach to cybersecurity, with partnerships between business, government and civil society put in place to achieve this goal. This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed approach that South Africa could follow in implementing its proposed cybersecurity policy framework, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.


2012 ◽  
Vol 2 (4) ◽  
pp. 13-27 ◽  
Author(s):  
Joey Jansen van Vuuren ◽  
Louise Leenen ◽  
Jackie Phahlamohlaka ◽  
Jannie Zaaiman

A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical infrastructure that needs to be safeguarded and protected. Although the South African government approved a draft National Cyber Security Policy Framework in March 2012, the country still needs a national cybersecurity governance structure in order to effectively control and protect its cyber infrastructure. Whilst various structures have been established to deal with cybersecurity in South Africa, they are inadequate and implementation of the policy is still in the very early stages. Structures need to be in place to set the security controls and policies and also to govern their implementation. It is important to have a holistic approach to cybersecurity, with partnerships between business, government and civil society put in place to achieve this goal. This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed approach that South Africa could follow in implementing its proposed cybersecurity policy framework, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.


While South Africa shares some characteristics with other middle-income countries, it has a unique economic history with distinctive characteristics. South Africa is an economic powerhouse with a significant role not only at the southern African regional and continental levels, but also as a member of BRICS. However, the country faces profound developmental challenges, including the ‘triple challenges’ of poverty, inequality and unemployment. There has been a lack of structural transformation and weak economic growth. Ongoing debates around economic policies to address these challenges need to be based on rigorous and robust empirical evidence and in-depth analysis of South African economic issues. This necessitates wide-ranging research, such as that brought together in this handbook. This volume intends to provide original, comprehensive, detailed, state-of-the-art analytical perspectives, that contribute to knowledge while also contributing to well-informed and productive discourse on the South African economy. While concentrating on the more recent economic challenges facing the country, the handbook also provides historical and political context, an in-depth examination of strategic issues in the various critical economic sectors, and assembles diverse analytical perspectives and arguments that have implications for policymaking.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Sean Atkins ◽  
Chappell Lawson

ABSTRACT The US Financial Services Sector (FSS) is commonly regarded as one of the most successful in addressing cybersecurity through public–private partnership and as a potential model for less advanced sectors. However, how well the sector has actually fared remains poorly understood. Based on publicly available material and in-depth interviews with those intimately involved in business–government collaboration on cybersecurity in the FSS, we analyze how and why collaboration evolved into its current form. We find that considerable gaps remain, which both reveal limitations in the current policy framework for the FSS and suggest lessons for other critical infrastructure sectors.


Author(s):  
Chibueze, E. Nnaji ◽  
Nnaji Moses ◽  
Jonathan N. Chimah ◽  
Monica C. Maduekwe

<div><p><em>This paper analysed the status of energy intensity of economic sectors (agriculture, industry, commercial, residential) in MINT (Mexico, Indonesia, Nigeria, Turkey) countries and its implications for sustainable development. We utilised descriptive statistics as well as the Logarithmic Mean Divisia Index (LMDI) decomposition analysis to examine energy and efficiency trends, from 1980-2013, in MINT countries. Empirical results indicate inefficient energy use in the residential and industrial sectors of Nigeria and Indonesia. The analysis  also indicates that income/output growth (activity effect) contributed to an increase in sectoral energy consumption of MINT countries. It also revealed that while structural effects contributed to a reduction in energy consumption in virtually all the sectors in Turkey and Mexico, it contributed to an increase in energy consumption of the residential, industrial and commercial sectors of Indonesia and Nigeria in virtually all the periods. These results suggest that a policy framework that emphasizes the utilization of energy efficient technologies especially electricity infrastructural development aimed at energy service availability, accessibility and affordability will help to trigger desirable economic development and ensure rapid sustainable development of MINT economies.</em></p></div>


2006 ◽  
pp. 111-146
Author(s):  
Andrew Colarik

Recognize that through global access to information, we are all potential targets. Ö Begin to understand just how much information that can be used against us is available in electronic form. Ö Briefly discover the vulnerable aspects and characteristics in our economic sectors. Ö Identify the connection between the electronic world and the physical world. Ö Come to realize the degree to which we utilize economic momentum as a competitive advantage, and how cyber terrorism attacks serve to disrupt it.


2020 ◽  
Vol 8 ◽  
Author(s):  
Paul A. Jarvis ◽  
Costanza Bonadonna ◽  
Lucia Dominguez ◽  
Pablo Forte ◽  
Corine Frischknecht ◽  
...  

During explosive volcanic eruptions, large quantities of tephra can be dispersed and deposited over wide areas. Following deposition, subsequent aeolian remobilisation of ash can potentially exacerbate primary impacts on timescales of months to millennia. Recent ash remobilisation events (e.g., following eruptions of Cordón Caulle 2011; Chile, and Eyjafjallajökull 2010, Iceland) have highlighted this to be a recurring phenomenon with consequences for human health, economic sectors, and critical infrastructure. Consequently, scientists from observatories and Volcanic Ash Advisory Centers (VAACs), as well as researchers from fields including volcanology, aeolian processes and soil sciences, convened at the San Carlos de Bariloche headquarters of the Argentinian National Institute of Agricultural Technology to discuss the “state of the art” for field studies of remobilised deposits as well as monitoring, modeling and understanding ash remobilisation. In this article, we identify practices for field characterisation of deposits and active processes, including mapping, particle characterisation and sediment traps. Furthermore, since forecast models currently rely on poorly-constrained dust emission schemes, we call for laboratory and field measurements to better parameterise the flux of volcanic ash as a function of friction velocity. While source area location and extent are currently the primary inputs for dispersion models, once emission schemes become more sophisticated and better constrained, other parameters will also become important (e.g., source material volume and properties, effective precipitation, type and distribution of vegetation cover, friction velocity). Thus, aeolian ash remobilisation hazard and associated impact assessment require systematic monitoring, including the development of a regularly-updated spatial database of resuspension source areas.


Sign in / Sign up

Export Citation Format

Share Document