GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Grobler, M"

Sort by: Order: Results:

  • Grobler, M; Jansen van Vuuren, J (2010-08)
    Africa has recently seen explosive growth in information and communication technologies, making cyber crime a reality in this part of the world. This paper investigates the possibility of another increase in cyber crime ...
  • Veerasamy, N; Grobler, M; Von Solms, B (Academic Publishing International, 2012-07)
    Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure ...
  • Grobler, M; Jansen van Vuuren, J; Zaaiman, J (Academic Conferences International, 2011-03)
    The international scope of the internet and global reach of technological usage requires the South African legislative system to address issues related to the application and implementation of international legislation. ...
  • Grobler, M; Van Vuuren, JJ (2009-12)
  • Grobler, M; Bryk, H (2010-08)
    A CSIRT is a team of dedicated information security specialists that prepares for and responds to information security incidents. When an incident occurs, members of a CSIRT can assist its constituency in determining what ...
  • Veerasamy, N; Grobler, M (CSIR. Defence Peace Safety and Security, 2010-10)
    Cyberterrorism addresses the convergence of the fear-causing world of terrorism with the abstract realm of cyberspace, computers and networks. While cyberterrorism can be executed using various technical security exploits, ...
  • Grobler, M; Flowerday, S; von Solms, R; Venter, H (2011-05)
    Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives ...
  • Grobler, M; Jansen van Vuuren, J; Zaaiman, J (2012-03)
    South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. ...
  • Grobler, M (2010-03)
    This paper presents a Digital Forensic (DF) governance framework and its mapping on the SANS ISO/IEC 38500:2009 Corporate governance of information technology structure. DF governance assists organisations in guiding the ...
  • Jacobs, P; Von Solms, S; Grobler, M (Academic Conferences and Publishing International Ltd, 2015-07)
    Security Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) can play a pivotal role in the monitoring of, and response to threats, attacks and ...
  • Botha, J; Eloff, M; Grobler, M (Springer, 2016-09)
    Pro-actively finding leaked information online can potentially reduce detection times to limit the exposure time of personal information on publicly accessible networks. Often the breaches are discovered by an external ...
  • Grobler, M; Jansen van Vuuren, J; Zaaiman, J (2011-07)
    In many ways, the internet and cyber world is a dangerous place where innocent users can inadvertently fall prey to shrewd cyber criminals. These dangers, combined with a large portion of the South African population that ...
  • Taute, B; Grobler, M; Nare, S (2009-10)
    The world is increasingly dependent on ICT for computing, communications, transactions, commerce, data storage, entertainment and a host of other functions. Protesters, terrorists and warmongers have found the Internet to ...
  • Grobler, M; Dlamini, Z (IIMC International Information Management Corporation, 2012-05)
    Cyber trends are a reality across the globe. Not only are technology and electronic devices and media used more regularly in easing everyday activities, but these technological advances are also used in sophisticated ...
  • Jansen van Vuuren, J; Grobler, M; Zaaiman, J (Academic Conferences Limited, 2012-03)
    In South Africa, cyber security has been identified as a critical component contributing towards National Security. More rural communities are becoming integrated into the global village due to increased hardware and ...
  • Grobler, M; Swart, I (Springer, 2014-07)
    Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept ...
  • Grobler, M; Jansen van Vuuren, J; Zaaiman, J (International Institute of Informatics and Cybernetics, 2013)
    The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both ...
  • Jansen van Vuuren, J; Grobler, M; Leenen, L; Phahlamohlaka, J (Springer, 2014-07)
    Most communications in the new era are dependent on Information and Communication Technology (ICT). In addition, infrastructure is becoming increasingly interconnected. This not only makes lives easier, but also leaves ...
  • Dlamini, I; Olivier, M; Grobler, M (2009-06)
    This paper extends work on a forensic model for traffic isolation based on Differentiated Services (DiffServ) and measures its performance by using a simulation. The simulated model has four basic components: traffic ...
  • Grobler, M (CSIR. Defence Peace Safety and Security, 2010-10)
    Strategic information security is becoming a more prominent aspect of modern day living. With the strong digital component that forms part of modern day business, the multiplicity of security risks and the emergence of ...