Author:Dawood, Zubeida C; Mashiane, TDate:Nov 2014With over a billion active users monthly Facebook is one of the biggest social media sites in the world. Facebook encourages friends and people with similar interests to share information such as messages, pictures, videos, website links, and ...Read more
Author:Mtsweni, Jabu S; Thaba, James MDate:2022Cyberspace has been designated by organizations such as NATO as the fifth domain for battlespace, and many nations are already having and/or building their capabilities in the cyber defence environment in order to protect and defend their ...Read more
Author:Van Heerden, Renier P; Irwin, B; Burke, Ivan D; Leenen, LDate:2012Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification ...Read more
Author:Aschmann, M; Jansen van Vuuren, J; Leenen, LDate:Mar 2015Information in the Global Digital Industrial Economic Age is viewed as a strategic resource. This article focus on the establishment of cyber armies within the World Wide Web, commonly known as the Grid, with the emphases on an unseen military ...Read more
Author:Grobler, M; Jansen van Vuuren, J; Zaaiman, JDate:Mar 2012South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. It is further noted ...Read more
Author:Veerasamy, NamoshaDate:Feb 2021The outbreak of the novel corona virus or Covid-19 has sparked a wave of changes. Social-distancing and remote working meant that increasingly employees and individuals were reliant on Information Communication Technologies (ICT) to connect ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Nov 2023The domains of warfare have become complex, where cyberspace is declared as the fifth domain. The complexity of cyber space is that it is borderless, and war could be launched from anywhere, and is a serious concern for national security. ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Jun 2023The evolution of technology in the African battlespace continues to pose a significant challenge to the African militaries. This evolution increases the need for the African militaries to be able to operate in the cyberspace strategically and ...Read more
Author:Dlamini, IZ; Taute, B; Radebe, JDate:May 2011Cyber security is a GLOBAL issue. The rest of the world needs Africa to be aware and ready. Furthermore, Africa can only be aware and ready if it is internally organised and collaborates effectively with the rest of the world. The African ...Read more
Author:Jansen van Vuuren, JC; Phahlamohlaka, Letlibe J; Brazzoli, MDate:Apr 2010The central argument in this paper is that the exponential increase in internet broadband will result in an increase in security threats that will also take the battlefield to the home of the average citizen in rural South Africa. The paper ...Read more
Author:Mtsweni, Jabu SDate:Mar 2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Venter, Jacobus P; Van Ellewee, MinrieDate:Sep 2017It is argued that the definition of the required operational capabilities in the short and long term is an essential element of command. Defence Capability Management can be a cumbersome, long and very resource intensive activity. Given the ...Read more
Author:Jansen van Vuuren, Joey; Leenen, LouiseDate:Mar 2018Cyber Defence is a core driver in the attainment of national security for any country. Perceived Cyberpower can be determined by the analysis of the elements of cyberspace as part of national security. In this paper the Perceived Cyberpower ...Read more
Author:Phahlamohlaka, Letlibe J; Théron, J; Aschmann, MJDate:2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Grobler, M; Swart, IDate:Jul 2014Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare, but ...Read more
Author:Chan, Ka Fai P; Theron, J; Van Heerden, Renier P; Leenen, LDate:Mar 2015In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter measures against these ...Read more
Author:Botha, P; Vawda, Shazia; Ramadeen, P; Terlunen, ADate:Mar 2015Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not always available or ...Read more
Author:Leenen, L; Meyer, TDate:Jul 2016The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of information pertinent ...Read more
Author:Veerasamy, NamoshaDate:Jun 2021Cyber attacks can affect the confidentiality, integrity and availability of data/ systems. Some attacks aim to steal data whereas others try cause destruction. One such vulnerability stems from the malicious use of USB chargers. When travelling ...Read more
Author:Labuschagne, WADate:Oct 2012As our dependence on information technology
increases, cyber attacks are becoming complex. The attack vector is growing and there are definite digital footprint dangers. Understanding of threat is critical; and security awareness is paramount ...Read more