Author:Dawood, Zubeida C; Mashiane, TDate:Nov 2014With over a billion active users monthly Facebook is one of the biggest social media sites in the world. Facebook encourages friends and people with similar interests to share information such as messages, pictures, videos, website links, and ...Read more
Author:Veerasamy, Namosha; Yoolla, Yaseen; Dawood, Zubeida CDate:Jun 2022Geospatial data is often perceived as only being related to maps, compasses and locations. However, the application areas of geospatial data are far wider and even extend to the field of cybersecurity. Not only is there an ability to show ...Read more
Author:Mouton, Francois; Teixeira, M; Meyer, TDate:Nov 2017As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a vulnerability of the ...Read more
Author:Dawood, Zubeida CDate:Mar 2019Computer Security Incident Response Teams (CSIRTs) are responsible for data collection and analysis concerning cyber security threat incidents. In order to provide the best service support for cyber security breaches, information about how ...Read more
Author:Naqvi, KH; Markus, ED; Muthoni, M; Abu-Mahfouz, Adnan MIDate:Apr 2022South Africa as a developing nation is evolving in new healthcare technologies. With an increase in these innovations comes many challenges foremost among which is security. This paper presents a review of challenges faced in IoT connected ...Read more
Author:Grobler, M; Flowerday, S; Von Solms, R; Venter, HDate:May 2011Cyber space, cyber awareness and cyber security play an important role in the online experience of individuals, and need to be addressed accordingly. The paper looks at some of the current cyber security awareness initiatives in South Africa, ...Read more
Author:Grobler, M; Jansen van Vuuren, J; Zaaiman, JDate:Mar 2012South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. It is further noted ...Read more
Author:Von Solms, R; Von Solms, SDate:Jul 2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Von Solms, R; Von Solms, SDate:2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Von Solms, R; Von Solms, SDate:Jul 2015Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing countries do not ...Read more
Author:Dlamini, Z; Modise, MDate:Mar 2012Technological advances have changed the manner in which ordinary citizens conduct their daily activities. Many of these activities are carried out over the Internet. These include filling tax returns, online banking, job searching and general ...Read more
Author:Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJDate:May 2011The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives, ...Read more
Author:Oosthuizen, Rudolph; Pretorius, L; Mouton, Francois; Molekoa, Malinkeng MDate:Feb 2019As cyber-attacks pose a major threat to organisations, security measures are required to protect networks and information. Defence against these attacks requires substantial resources and investments from organisations. The level of perceived ...Read more
Author:Adedeji, KB; Abu-Mahfouz, Adnan MI; Kurien, AMDate:Jul 2023In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent ...Read more
Author:Labuschagne, WA; Burke, Ivan D; Veerasamy, Namosha; Eloff, MMDate:Aug 2011Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it an ideal tool through ...Read more
Author:Thaba, James M; Mtsweni, Jabu SDate:Jun 2023The evolution of technology in the African battlespace continues to pose a significant challenge to the African militaries. This evolution increases the need for the African militaries to be able to operate in the cyberspace strategically and ...Read more
Author:Molokomme, DN; Onumanyi, Adeiza J; Abu-Mahfouz, Adnan MIDate:Aug 2022The rapid development of new information and communication technologies (ICTs) and the deployment of advanced Internet of Things (IoT)-based devices has led to the study and implementation of edge computing technologies in smart grid (SG) ...Read more
Author:Grobler, M; Jansen van Vuuren, J; Zaaiman, JDate:Jul 2011In many ways, the internet and cyber world is a dangerous place where innocent users can inadvertently fall prey to shrewd cyber criminals. These dangers, combined with a large portion of the South African population that has not had regular ...Read more
Author:Moloja, D; Mpekoa, Noluntu; Van Greunen, DDate:Sep 2020The developments in Information and Communication Technology transformed almost every aspect of everyday life. Modern societies are now fully dependent on ICT for commercial, labor, and leisure activities, excluding in the voting area. Using ...Read more
Author:Dlamini, IZ; Taute, B; Radebe, JDate:May 2011Cyber security is a GLOBAL issue. The rest of the world needs Africa to be aware and ready. Furthermore, Africa can only be aware and ready if it is internally organised and collaborates effectively with the rest of the world. The African ...Read more