Author:Grobler, M; Jansen van Vuuren, J; Zaaiman, JDate:Mar 2012South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. It is further noted ...Read more
Author:Dlamini, Z; Modise, MDate:Mar 2012Technological advances have changed the manner in which ordinary citizens conduct their daily activities. Many of these activities are carried out over the Internet. These include filling tax returns, online banking, job searching and general ...Read more
Author:Venter, JP; Nare, SDate:Nov 2008The rapid development and use of information and communication technology (ICT) has influenced everyday life, mostly in a positive manner. This technology is, however, also available to the criminally minded. Activities performed through ICT ...Read more
Author:Taute, B; Grobler, M; Nare, SDate:Oct 2009The world is increasingly dependent on ICT for computing, communications, transactions, commerce, data storage, entertainment and a host of other functions. Protesters, terrorists and warmongers have found the Internet to be a useful tool to ...Read more
Author:Grobler, M; Dlamini, ZDate:May 2012Cyber trends are a reality across the globe. Not only are technology and electronic devices and media used more regularly in easing everyday activities, but these technological advances are also used in sophisticated criminal activities. ...Read more
Author:Pretoria NewsDate:27 Aug 2008The head of the CSIR safety and security competency area, Dr Barend Taute, says that about 10 years ago the CSIR considered what could be done about crime in South Africa. They established a crime prevention centre which eventually became the ...Read more
Author:Grobler, MMDate:Oct 2009The candidate's research investigated the development of a model for Live Forensic Acquisition - Liforac. The Liforac model is a wide-ranging model that presents many of the most important aspects related to Live Forensic Acquisition, ...Read more
Author:Jansen van Vuuren, JCDate:Sep 2010The presentation addresses national security issues and the impact of cyber threats on the average citizen. It classifies cyber threats, analysis national security and provides security tips to safeguard the individual against cyber threats.Read more
Author:Grobler, MMDate:May 2010The best Information Security infrastructure cannot guarantee that intrusions or other malicious acts will not happen. It is necessary to know the facts and prepare beforehand knowing cyber threats and trends; knowing the broadband impact on ...Read more
Author:Labuschagne, WADate:Oct 2012As our dependence on information technology
increases, cyber attacks are becoming complex. The attack vector is growing and there are definite digital footprint dangers. Understanding of threat is critical; and security awareness is paramount ...Read more
Author:Grobler, M; Dlamini, Z; Ngobeni, Sipho J; Labuschagne, ADate:Aug 2011A large portion of the South African rural community only have intermittent access to computers and are not familiar, nor entirely comfortable, with the use of internet communication or electronic devices. The research conducted by the authors ...Read more