GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Subject "Cyber threats"

Sort by: Order: Results:

  • Labuschagne, WA; Burke, I; Veerasamy, N; Eloff, MM (2011-08)
    Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it ...
  • Jansen van Vuuren, JC (2010-09)
    The presentation addresses national security issues and the impact of cyber threats on the average citizen. It classifies cyber threats, analysis national security and provides security tips to safeguard the individual ...
  • Robertson, J; Lessing, M; Nare, S (2008-07)
    The military’s decision to move from proprietary software to commercially available software leaves the military’s Information Technology security vulnerable and potentially unprotected. To be sufficiently prepared to these ...
  • Grobler, MM (2010-05)
    The best Information Security infrastructure cannot guarantee that intrusions or other malicious acts will not happen. It is necessary to know the facts and prepare beforehand knowing cyber threats and trends; knowing the ...
  • Grobler, M; Dlamini, Z; Ngobeni, S; Labuschagne, A (2011-08)
    A large portion of the South African rural community only have intermittent access to computers and are not familiar, nor entirely comfortable, with the use of internet communication or electronic devices. The research ...