Author:Grobler, M; Flowerday, S; Von Solms, R; Venter, HDate:May 2011Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives in South Africa, ...Read more
Author:Grobler, M; Jansen van Vuuren, J; Zaaiman, JDate:Mar 2012South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. It is further noted ...Read more
Author:Von Solms, R; Von Solms, SDate:Jul 2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Von Solms, R; Von Solms, SDate:2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Von Solms, R; Von Solms, SDate:Jul 2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Dlamini, Z; Modise, MDate:Mar 2012Technological advances have changed the manner in which ordinary citizens conduct their daily activities. Many of these activities are carried out over the Internet. These include filling tax returns, online banking, job searching and general ...Read more
Author:Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJDate:May 2011The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives, ...Read more
Author:Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJDate:May 2011The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives ...Read more
Author:Oosthuizen, Rudolph; Pretorius, L; Mouton, Francois; Molekoa, Malinkeng MDate:Feb 2019As cyber-attacks pose a major threat to organisations, security measures are required to protect networks and information. Defence against these attacks requires substantial resources and investments from organisations. The level of perceived ...Read more
Author:Veerasamy, NamoshaDate:Jun 2017Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and ...Read more
Author:Pieterse, HeloiseDate:Dec 2021The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is ...Read more
Author:Strauss, PDate:Oct 2017This presentation discusses cybercrimes in the banking sector, and how these crimes are profoundly different to traditional crime.Read more
Author:Veerasamy, NamoshaDate:Feb 2021The outbreak of the novel corona virus or Covid-19 has sparked a wave of changes. Social-distancing and remote working meant that increasingly employees and individuals were reliant on Information Communication Technologies (ICT) to connect ...Read more
Author:Mkuzangwe, Nenekazi N; Dawood, Zubeida CDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Mapimele, Fikile V; Mangoale, Bokang CDate:Feb 2019In recent years, cybercrime has become one of the most rapidly growing areas of crime. The emergence of new technologies has presented new cybercrime opportunities that are becoming more sophisticated. As a result, imdividuals, corporations ...Read more
Author:Sithole, Happy M; Staphorst, L; Vahed, AnwarDate:Oct 2015Cyberinfrastructure is a combination of massive processing capability, high-speed connectivity, massive storage facilities and highly skilled personnel. Leading nations have invested significantly in these facilities and closely aligned them ...Read more
Author:Mutemwa, Muyowa; Mtsweni, Jabu SDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Botha, JacoDate:2017This presentation discusses Cybersecurity as an enabler and pre-requisite for industry 4.0. A figure of the progression of cyber and physical threats for each industrial revolution has evolved is discussed.Read more
Author:Gcaza, NoluxoloDate:Aug 2018Information and communication technologies (ICTs) are responsible for the transformation of societies, nations and the world at large. ICTs are considered to improve the quality of life for citizens as they bring about easiness and usefulness ...Read more
Author:Veerasamy, NamoshaDate:Sep 2020Technological advancements continue to progress and so too grows the prospect of cyberterrorism. Hacking tools are growing in sophistication, and agitated terrorist groups may look for an innovative outlet for their political, religious or ...Read more