Author:Dlamini, Moses T; Eloff, MM; Eloff, JHP; Hone, KDate:Jul 2009The entire business landscape finds itself on the verge of a recession because of ongoing global economic turmoil. Thus, there is a heightened need to minimise and mitigate business risk and scrutinise information spending while ensuring ...Read more
Author:Grobler, MM; Von Solms, SHDate:Jul 2009The development of the Live Forensic discipline instigates the development of a method that allows forensically sound acquisition to stand fast in a court of law. The study presents the development of a comprehensive model for forensically ...Read more
Author:Dlamini, I; Olivier, MDate:Jul 2009Currently, network evidence used in a court of law can be lacking and inadequate for prosecution purposes, due to a loss of packets during the network transmission. This packet loss in turn may be caused by the congestion of data transmitted ...Read more
Author:Ngobeni, Sipho J; Venter, HSDate:Jul 2009The proliferation of wireless mobile communication technology has emerged and this has resulted in the increase of the wireless users. On the other hand, cyber crime in WLANs has appeared to be gradually increasing world wide. Wireless network ...Read more
Author:Ngobeni, Sipho J; Grobler, MMDate:Jul 2009Recent technology advancement has resulted in an era where many organisations become more and more comfortable to use computer systems to process their information. Intruders are making it their mission to break into these computer systems ...Read more
Author:Veerasamy, Namosha; Taute, BDate:Apr 2009With technological change and advancement, attackers are increasingly becoming more sophisticated in their attack strategies and techniques. Other global factors and developments also impact the line of attack. This paper provides an introduction ...Read more