Author:Labuschagne, WA; Eloff, MMDate:Jul 2014Using cyberspace to conduct business and personal duties has become ubiquitous to an interconnected society. The use of information technology has provided humanity with a platform to evolve and contribute to the advancement of society. However ...Read more
Author:Eloff, JHP; Eloff, MM; Dlamini, Moses T; Zielinski, MPDate:Dec 2009The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a ...Read more
Author:Van Heerden, Renier P; Bester, IM; Burke, Ivan DDate:Nov 2012This study focuses on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some security concerns ...Read more
Author:Pearson, D; Irwin, Barry VW; Herbert, ADate:Sep 2017Malicious entities are constantly trying their luck at exploiting known vulnerabilities in web services, in an attempt to gain access to resources unauthorized access to resources. For this reason security specialists deploy various network ...Read more