Towards the Legal Protection of Critical Infrastructure in Africa Against Cyberwar and Cyberterrorism

Publish Year: 1402
نوع سند: مقاله ژورنالی
زبان: English
View: 83

This Paper With 32 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JCSS-7-2_002

تاریخ نمایه سازی: 25 آبان 1402

Abstract:

This article reviews the legal framework governing the protection of critical infrastructure in Africa with an emphasis on threats like cyberwar and cyberterrorism. As African governments and businesses increasingly depend on the internet and information systems, there is a need to enact appropriate laws to protect critical infrastructure from cyberattacks that could jeopardize the economic and national security postures of African countries. The article outlines the need for appropriate legal instruments to protect critical infrastructure as African businesses increasingly rely on the internet and information systems. The lack of adequate laws regulating critical infrastructure does not translate to the absence of critical infrastructure in African countries. Ghana, for instance, has a legal framework governing critical infrastructure. These infrastructures are common in most African countries but lack the required legal framework to protect them. It is important to note that despite the Budapest Convention and African Convention on Cybersecurity and Personal Data Protection, there is no international legal framework regulating cyberwar and cyberterrorism. Considering these factors, this article reviews Ghana's Cybersecurity Act and the Directive on Critical Information Infrastructure and uses the United States framework for comparative analysis. In addition to reviewing the types of attacks critical infrastructure could face, the article looks at the legal framework for managing incidents that could arise from cyberattacks targeting critical infrastructure.

Authors

Bernard Ngalim

University of the Free State, Bloemfontein, South Africa

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Alford, J. (۲۰۱۹, October ۰۲). imperial.ac.uk. Retrieved from https://www.imperial.ac.uk/news/۱۹۳۱۵۱/nhs-cyber-attacks-could-delay-life-saving-care/:~:text=A%۲۰new%۲۰analysis%۲۰has%۲۰revealed,be%۲۰almost%۲۰%C۲%A۳۶%۲۰million ...
  • Alford, L. (۲۰۰۰). “Cyberwarfare: Protecting Military Systems”. Acquisition Review Quarterly. ...
  • Allen, N. (۲۰۲۱, January ۱۳). africacenter.org. Retrieved from https://africacenter.org/spotlight/africa-evolving-cyber-threats/ ...
  • Allianze. (n.d.). alliance.com. Retrieved from https://commercial.allianz.com/news-and-insights/expert-risk-articles/cyber-attacks-on-critical-infrastructure.html ...
  • Beuren, R., Chinen, K.I., Tan, Y. & Shinoda, Y. (۲۰۱۶). ...
  • Bolonga, S., Fasani, A. & Martellini, M. (۲۰۱۳). “Cyber security ...
  • Budapest Convention. (n.d.) ...
  • Budd, J., Miller, B.S., Manning, E.M., Lampos, V. et al. ...
  • CISA. (n.d.). www.cisa.gov. Retrieved from Critical Infrastructure Security Agency : ...
  • Corallo, A., Mariangela, L. & Lezzi, M. (۲۰۲۰). “Cybersecurity in ...
  • Cornish, P., Livingstone, D., Clemente, D. & Yorke, C. (۲۰۱۰). ...
  • Corrigan, T. (۲۰۲۰). saiia.org. Retrieved from https://saiia.org.za/wp-content/uploads/۲۰۲۰/۰۶/Policy-Briefing-۱۹۷-corrigan.pdf ...
  • Dawson, M. et al. (۲۰۲۱). “Understanding the challenge of cybersecurity ...
  • DCPII. (n.d.). Directive for the Protection of Critical Information Infrastructure ...
  • Denning, D.E. (۲۰۰۰, May ۲۳). faculty.nps.edu. Retrieved from https://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism۲۰۰۰.htm ...
  • Dibie, A. & Okwonko. (۲۰۰۰). The Importance of Infrastructure in ...
  • Executive Order on Improving Critical Infrastructure Cybersecurity. (۲۰۱۳). The Government ...
  • Ghana’s Cybersecurity Act. (۲۰۲۰). Ghana’s Cybersecurity Act, ۲۰۲۰. The Ghana ...
  • Goth, L. (n.d.). www.leachagency.com. Retrieved from https://www.leachagency.com/malware-the-main-weapon-of-cyberattacks/ ...
  • Kesici Çalışkan H. (۲۰۱۵). “Technological change and economic growth”. Procedia ...
  • Hollis, D. (۲۰۲۱, June ۲۱). carnegieendowment.org. Retrieved from https://carnegieendowment.org/files/Hollis_Law_and_Cyberspace.pdf ...
  • INTERPOL. (۲۰۲۱). Africa Cyber Threats Assessment, INTERPOL’s Key Insights into ...
  • Karagiannopoulos, V. (۲۰۲۰, January ۱۰). theconversation.com. Retrieved from https://theconversation.com/how-real-is-the-threat-of-cyberwar-between-iran-and-the-us-۱۲۹۵۷۳ ...
  • Knapp, K. & Boulton, W. (۲۰۰۷). “Ten Information Warfare Trends”. ...
  • Le Bris, A. & El Asri, W. (۲۰۱۷). ESSEC Business ...
  • Lewis, J. (۲۰۰۳). Assessing the Risks of Cyber Terrorism, Cyberwar ...
  • Marsili, M. (۲۰۱۸). The war on cyberterrorism. Democracy and Security. ...
  • McKinsey. (n.d.). Mckinsey.com. Retrieved from https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/cybersecurity-trends-looking-over-the-horizon ...
  • Moteff, J.A. (۲۰۰۴). Critical Infrastructure and Key Assets: Definition and ...
  • Moynihan, H. (۲۰۱۹). The Application of International Law to State ...
  • Newbill, C.M. (۲۰۱۹). “Defining critical infrastructure for a global application. ...
  • NIPP. (۲۰۱۳). Partnering for Critical Infrastructure Security and Resilience ...
  • NIST. (۲۰۲۲). Framework for Improving Critical Infrastructure Cybersecurity ...
  • NIST ۸۰۰-۳۷ rev ۲. (۲۰۱۸). Manangement Framework for Information Systems ...
  • NIST ۸۰۰-۵۳ r ۵. (۲۰۲۳). NIST Security aand Privacy Controls ...
  • OECD. (۲۰۰۸). Recommendation of the Council on the Protection of ...
  • OECD/LEGAL/۰۳۶۱. (n.d.). Recommendation of the Council on the Protection of ...
  • Orji, U. (n.d.). “The African Union Convention on Cybersecurity: A ...
  • Patriot Act. (۲۰۰۱). Section ۱۰۱۶(e) ...
  • Primoraz, I. (۲۰۱۹). “What is terrorism?”. Journal of Applied Philosophy. ...
  • Qureshi, Z. (۲۰۲۰, February). brookings.edu. Retrieved from https://www.brookings.edu/articles/technology-and-the-future-of-growth-challenges-of-change/ ...
  • Red Cross. (n.d.). icrc.org. Retrieved from https://www.icrc.org/en/document/cyber-warfare-ihl-provides-additional-layer-protection ...
  • Riggi, J. (n.d.). aha.org. Retrieved from https://www.aha.org/center/cybersecurity-and-risk-advisory-services/ransomware-attacks-hospitals-have-changed ...
  • Rodenhäuser, T. (n.d.). icrc.org. Retrieved from https://www.icrc.org/en/document/cyber-warfare-and-international-humanitarian-law ...
  • Rufus, A. & Bufumoh, P.E. (۲۰۱۷). “Critical infrastructure decay and ...
  • Schimdt-Berndt, S. (۲۰۲۳). “Defining the reporting threshold for a cybersecurity ...
  • Schneier, B. (۲۰۱۰). Forbes. Retrieved from https://www.forbes.com/۲۰۱۰/۱۰/۰۶/iran-nuclear-computer-technology-security-stuxnet-worm.html?sh=۱b۱۸b۶۸۰۵۱e۸ ...
  • Shiryaev, Y. (۲۰۱۲). “Cyberterrorism in the context of contemporary international ...
  • Taddeo, M. (۲۰۱۱). “Information Warfare: A philosophical perspective”. Philosophy and ...
  • Tahir, R. (۲۰۱۸). “A study on malware and malware detection ...
  • The Malabo Convention. (n.d.) ...
  • The Patriot Act, ۲۰۰۱. (n.d.) ...
  • Theohary, C. & Rollins, J. (۲۰۱۵). Cyberwarfare and Cyberterrorism: In ...
  • Tome, A., Fishbane, L., Siefer, A. & Callahan, B. (n.d.). ...
  • Turton, W., Riley, M. & Jacobs, J. (۲۰۲۱, May ۱۳). ...
  • UK Department of Health and Social Care. (۲۰۱۸). Securing cyber ...
  • UNGA. (n.d.). A/RES/۶۴/۲۱۱, Resolution on the Creation of a global ...
  • Uzoh & Baulo. (۲۰۱۳). “Improving critical infrastructure for sustainable development ...
  • Weenk, S. (۲۰۲۰). “National cybersecurity strategies in the healthcare industry ...
  • Zhang, Z. (n.d.). “Cybersecurity Policy for the Electricity Sectoor: The ...
  • نمایش کامل مراجع