Author:Dawood, Zubeida C; Mkuzangwe, Nenekazi NPDate:Mar 2022There is a growth of cyber-attacks in South Africa. Seeing that there are over 38 million Internet users in South Africa, this is no surprise. The South African government has published the National Cybersecurity Policy Framework (NCPF) and ...Read more
Author:Muronga, Khangwelo; Herselman, Martha E; Botha, Adèle; Da Veiga, ADate:Sep 2019This study aimed to ascertain the types of approaches that are applied in the assessments of information security and cybersecurity user awareness and training programs. The study focused on achieving two objectives. The first objective focused ...Read more
Author:Mtsweni, Jabu SDate:12 Aug 2015oday, public-facing websites are virtually used across all different sectors by different types of organizations for information sharing and conducting core business activities. At the same time, the increasing use of mobile devices in Africa ...Read more
Author:Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NNDate:Sep 2017This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous work to move ...Read more
Author:Pretorius, Morne; Ngejane, Hombakazi CDate:Dec 2019The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub— more correctly ...Read more
Author:Mtsweni, Jabu S; Thaba, James MDate:2022Cyberspace has been designated by organizations such as NATO as the fifth domain for battlespace, and many nations are already having and/or building their capabilities in the cyber defence environment in order to protect and defend their ...Read more
Author:Botha, Johannes G; Van ‘t Wout, Magdalena C; Leenen, LDate:Jul 2019Mobile messaging or chat Applications (Apps) have gained increasing popularity over the past decade. Large amounts of data are being transmitted over the internet when people make use of these Apps. Metadata and personal information are being ...Read more
Author:Taute, Barend JEDate:Oct 2017This presentation discusses the work that has been done by the CSIR in order to improve cybersecurity in the South African industry. The CSIR's cybersecurity track record, RDI focus areas, key R&D partnerships as well as initiatives such as ...Read more
Author:Naidoo, KovelinDate:Oct 2017This presentation gives a short history of cybercrimes, and also discusses the main global cybersecurity issues and trends.Read more
Author:Phahlamohlaka, Letlibe J; Jansen van Vuuren, JC; Coetzee, AJDate:May 2011The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives ...Read more
Author:Pieterse, HeloiseDate:Dec 2021The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is ...Read more
Author:Strauss, PDate:Oct 2017This presentation discusses cybercrimes in the banking sector, and how these crimes are profoundly different to traditional crime.Read more
Author:Mkuzangwe, Nenekazi N; Dawood, Zubeida CDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Mutemwa, Muyowa; Mtsweni, Jabu SDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Pillay, KDate:Oct 2017This presentation discusses cybersecurity operations as well as the cybersecurity hub implemented and used by the South African Department of Telecommunications and Postal Services.Read more
Author:Von Solms, S; Van Heerden, Renier PDate:Jul 2015The development of the Network Emulation and Simulation Laboratory is motivated by the drive to contribute to the enhancement of the security and resilience of South Africa's critical information infrastructure. The goal of the Network Emulation ...Read more
Author:Van 't Wout, Magdalena CDate:Mar 2019The current year, 2017, has already seen an excessive amount of cyber security disasters, apart from the continuation of standard corporate breaches. In the first half of the year, there had already been full-on campaign hacking, leaks of spy ...Read more
Author:Mtsweni, Jabu S; Mutemwa, Muyowa; Mkhonto, NjabuloDate:2016As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and respond to cyberattacks ...Read more
Author:Jansen van Vuuren, JC; Leenen, L; Phahlamohlaka, Letlibe J; Zaaiman, JJDate:Mar 2013National governments have the responsibility to provide, regulate and maintain national security, which includes cybersecurity for their citizens. Although South Africa has recently published its first draft cybersecurity policy, the ...Read more