Congratulations, you have reached the end of the module. In the concluding part, we will reflect on the key takeaways from this module, leaving some additional space for you to write down the points which seem important to you and are not included above.
As more government and private sector run infrastructure go online to improve efficiency and integration, security considerations for the protection of these infrastructures, embedded in strategy, policy and legislation is imperative.
In this module, through the exploration of definitions and methodologies of identification of Critical Infrastructure (CI) and Critical Information Infrastructure (CII), we have appreciated differences between international, regional and national perspectives. We have considered the policy, legislative, and regulatory guidelines are necessary for the identification of resources and the creation of governance frameworks for CI and CII protection. Finally, we have briefly discussed the geopolitical issues that African countries need to keep in mind when drawing up and implementing CI and CII protection policies.
Reflection point
Write down 5 important points that are important to you and are not included in this module.