GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Subject "Cyber warfare"

Sort by: Order: Results:

  • Khan, ZC; Mashiane, T (Information Security for South Africa (ISSA), 2014, 2014-11)
    With over a billion active users monthly Facebook is one of the biggest social media sites in the world. Facebook encourages friends and people with similar interests to share information such as messages, pictures, videos, ...
  • Van Heerden, RP; Irwin, B; Burke, ID; Leenen, L (IGI Global Publishing, 2012)
    Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of ...
  • Aschmann, M; Jansen van Vuuren, J; Leenen, L (2015-03)
    Information in the Global Digital Industrial Economic Age is viewed as a strategic resource. This article focus on the establishment of cyber armies within the World Wide Web, commonly known as the Grid, with the emphases ...
  • Grobler, M; Jansen van Vuuren, J; Zaaiman, J (2012-03)
    South Africa does not have a coordinated approach in dealing with cyber security, and the various structures that have been established to deal with cyber security issues are inadequate to deal with the issues holistically. ...
  • Dlamini, IZ; Taute, B; Radebe, J (2011-05)
    Cyber security is a GLOBAL issue. The rest of the world needs Africa to be aware and ready. Furthermore, Africa can only be aware and ready if it is internally organised and collaborates effectively with the rest of the ...
  • Jansen van Vuuren, JC; Phahlamohlaka, J; Brazzoli, M (2010-04)
    The central argument in this paper is that the exponential increase in internet broadband will result in an increase in security threats that will also take the battlefield to the home of the average citizen in rural South ...
  • Grobler, M; Swart, I (Springer, 2014-07)
    Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept ...
  • Chan, P; Theron, J; Van Heerden, R; Leenen, L (2015-03)
    In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter ...
  • Botha, P; Vawda, S; Ramadeen, P; Terlunen, A (2015-03)
    Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not ...
  • Leenen, L; Meyer, T (IGI Global, 2016-07)
    The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of ...
  • Labuschagne, WA (2012-10)
    As our dependence on information technology increases, cyber attacks are becoming complex. The attack vector is growing and there are definite digital footprint dangers. Understanding of threat is critical; and security ...
  • Van Heerden, R; Chan, P; Leenen, L; Theron, J (IGI Global, 2016-09)
    The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning ...