Author:Van Heerden, Renier P; Von Solms, S; Mooi, RDate:May 2016This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal ...Read more
Author:Veerasamy, NamoshaDate:Apr 2009Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to ...Read more
Author:Mutemba, M; Mtsweni, Jabu S; Mkhonto, NNDate:Mar 2017Cyber attacks are on the increase in severity, complexity and frequency, negatively affecting the citizens, government, and businesses. Adversely, the security and Defence role-players in developing countries, such as South Africa, are short ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Jun 2023The evolution of technology in the African battlespace continues to pose a significant challenge to the African militaries. This evolution increases the need for the African militaries to be able to operate in the cyberspace strategically and ...Read more
Author:Van Heerden, Renier P; Von Solms, S; Vorster, JDate:May 2018The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. Many of the large ...Read more
Author:Mtsweni, Jabu SDate:Nov 2023Cybersecurity attacks are classified in the top 10 global risks by the World Economic Forum in 2023. The common cyber-incidents that affect businesses, governments, and individuals across the globe are data breaches. Recent reports indicate ...Read more
Author:Veerasamy, NamoshaDate:Jun 2021Cyber attacks can affect the confidentiality, integrity and availability of data/ systems. Some attacks aim to steal data whereas others try cause destruction. One such vulnerability stems from the malicious use of USB chargers. When travelling ...Read more