Author:Labuschagne, WA; Burke, Ivan D; Veerasamy, Namosha; Eloff, MMDate:Aug 2011Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it an ideal tool through ...Read more
Author:Leenen, L; Alberts, R; Britz, K; Gerber, A; Meyer, TDate:Mar 2011In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent ...Read more
Author:Taute, BDate:06 Jun 2009In his keynote address on the DST-funded Information Security Centre of Competence, the speaker concentrates on four important issues. These refer to threats and vulnerabilities in Cyberspace (that encompasses all forms of networked, digital ...Read more
Author:Jacobs, P; Von Solms, S; Grobler, MDate:Jul 2015Security Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) can play a pivotal role in the monitoring of, and response to threats, attacks and vulnerabilities in ...Read more
Author:Nwanebu, DocasDate:Mar 2019Securing information is a paramount feature in the world of internet where there is consistence enormous flow of information. With everyone having access to the same internet, sensitive information needs concealment from adversaries. Especially ...Read more
Author:Taute, B; Grobler, M; Nare, SDate:Oct 2009The world is increasingly dependent on ICT for computing, communications, transactions, commerce, data storage, entertainment and a host of other functions. Protesters, terrorists and warmongers have found the Internet to be a useful tool to ...Read more
Author:Dlamini, IZ; Taute, B; Radebe, JDate:May 2011Cyber security is a GLOBAL issue. The rest of the world needs Africa to be aware and ready. Furthermore, Africa can only be aware and ready if it is internally organised and collaborates effectively with the rest of the world. The African ...Read more
Author:Burke, Ivan D; Naidoo, Sasha; Olivier, MSDate:Apr 2010Mobile Ad hoc Networks have become an attractive option for military and disaster-response operations. Its ad hoc nature allows for fast deployment and requires no pre-existing network infrastructure. Most of the MANET protocol development ...Read more
Author:Khutlang, Rethabile; Khanyile, Nontokozo P; Makinana, Sisanda; Nelwamondo, Fulufhelo VDate:May 2016Biometric fingerprint scanners scan the external skin features onto a 2D image. The performance of the automatic fingerprint identification system suffers if the finger skin is wet, worn out, fake fingerprint is used et cetera. Swept source ...Read more
Author:Veerasamy, NamoshaDate:Apr 2010The aim of this paper is to describe how various observations made by sections of the world population direct people into making decisions and committing acts of cyberterror. The paper will thus look at issues like the environmental factors, ...Read more
Author:Jansen van Vuuren, JC; Phahlamohlaka, Letlibe J; Brazzoli, MDate:Apr 2010The central argument in this paper is that the exponential increase in internet broadband will result in an increase in security threats that will also take the battlefield to the home of the average citizen in rural South Africa. The paper ...Read more
Author:Mthethwa, Sthembile; Barbour, GrahamDate:Dec 2016The rapid growth of biometric technologies and wide accessibility of capturing devices has resulted in biometric systems becoming increasingly common in different applications. This has led to the introduction of ATMs in countries like Japan ...Read more
Author:Dlamini, Moses T; Eloff, JHP; Eloff, MMDate:2009Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations’ economic growth. This paper investigates the evolution of information security; where it came from, ...Read more
Author:Gangire, Y; Da Veiga, A; Herselman, Martha EDate:Aug 2020Employee information security behaviour is important in securing an organisation’s information technology resources. Employees can act in a risky or secure manner. Improving employee information security behaviour is important for organisations ...Read more
Author:Höne, K; Eloff, JHPDate:2009World wide the importance of Information Security Governance is demanding the attention of senior management. This is due to the ever-changing threat landscape requiring that organisations adopt a focussed approach towards the protection of ...Read more
Author:Dlamini, Moses T; Eloff, MM; Eloff, JHPDate:Aug 2009Information security is becoming a major concern for most worldwide telecommunication companies and more so as we move towards the future Internet of Things. In this era, a plethora of digital devices, people and other physical objects have ...Read more
Author:Veerasamy, Namosha; Taute, BDate:Apr 2009With technological change and advancement, attackers are increasingly becoming more sophisticated in their attack strategies and techniques. Other global factors and developments also impact the line of attack. This paper provides an introduction ...Read more
Author:Martim, E; Dlamini, M; Van Greunen, D; Eloff, J; Herselman, Martha EDate:Mar 2009Security and usability are crucial factors for the successful of any e-commerce system. However, they have traditionally been considered a design trade-off. In an effort to align them, this paper highlights the design principles and guidelines ...Read more
Author:Van Heerden, Renier P; Von Solms, S; Vorster, JDate:May 2018The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. Many of the large ...Read more
Author:Grobler, MM; Dlamini, IZDate:2010Governance in general is becoming increasingly important in contemporary management, but specifically the governance of Digital Forensics. In order to manage governance disciplines effectively, closer attention needs to be paid to the technical ...Read more