Towards an evaluation and protection strategy for critical infrastructure

dc.contributor.advisorIrwin, Barry
dc.contributor.advisorArnab, Alapan
dc.contributor.authorGottschalk, Jason Howard
dc.date.accessioned2026-03-04T08:22:02Z
dc.date.issued2015
dc.description.abstractCritical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the "internet of things" . This list is not complete and a constant challenge exists in identifying Critical Infrastructure and its interdependencies. The purpose of this research is to highlight the importance of protecting Critical Infrastructure as well as proposing a high level framework aiding in the identification and securing of Critical Infrastructure. To achieve this, key case studies involving Cyber crime and Cyber warfare, as well as the identification of attack vectors and impact on against Critical Infrastructure (as applicable to Critical Infrastructure where possible), were identified and discussed. Furthermore industry related material was researched as to identify key controls that would aid in protecting Critical Infrastructure. The identification of initiatives that countries were pursuing, that would aid in the protection of Critical Infrastructure, were identified and discussed. Research was conducted into the various standards, frameworks and methodologies available to aid in the identification, remediation and ultimately the protection of Critical Infrastructure. A key output of the research was the development of a hybrid approach to identifying Critical Infrastructure, associated vulnerabilities and an approach for remediation with specific metrics (based on the research performed). The conclusion based on the research is that there is often a need and a requirement to identify and protect Critical Infrastructure however this is usually initiated or driven by non-owners of Critical Infrastructure (Governments, governing bodies, standards bodies and security consultants). Furthermore where there are active initiative by owners very often the suggested approaches are very high level in nature with little direct guidance available for very immature environments.
dc.description.degreeMaster's thesis
dc.description.degreeMSc
dc.format.extent106 pages
dc.format.mimetypeapplication/pdf
dc.identifier.otherhttp://hdl.handle.net/10962/d1018793
dc.identifier.urihttps://researchrepository.ru.ac.za/handle/123456789/5824
dc.languageEnglish
dc.publisherRhodes University, Faculty of Science, Department of Computer Science
dc.rightsGottschalk, Jason Howard
dc.subjectComputer crimes -- Prevention
dc.subjectComputer networks -- Security measures
dc.subjectComputer crimes -- Law and legislation -- South Africa
dc.subjectPublic works -- Security measures
dc.titleTowards an evaluation and protection strategy for critical infrastructure
dc.typeAcademic thesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Towards_an_evaluation_and_protection_strategy_for__vital_4721.pdf
Size:
1.58 MB
Format:
Adobe Portable Document Format