Author:Dawood, Zubeida C; Mkuzangwe, Nenekazi NPDate:Mar 2022There is a growth of cyber-attacks in South Africa. Seeing that there are over 38 million Internet users in South Africa, this is no surprise. The South African government has published the National Cybersecurity Policy Framework (NCPF) and ...Read more
Author:Dawood, Zubeida CDate:Mar 2019Computer Security Incident Response Teams (CSIRTs) are responsible for data collection and analysis concerning cyber security threat incidents. In order to provide the best service support for cyber security breaches, information about how ...Read more
Author:Pieterse, HeloiseDate:Dec 2021The world is witnessing a rise in cyber-related incidents. As information technology improves and the reliance on technology increases, the frequency and severity of cyber incidents escalate. The impact is felt globally, and South Africa is ...Read more
Author:Veerasamy, NamoshaDate:Feb 2021The outbreak of the novel corona virus or Covid-19 has sparked a wave of changes. Social-distancing and remote working meant that increasingly employees and individuals were reliant on Information Communication Technologies (ICT) to connect ...Read more
Author:Mutemwa, Muyowa; Mtsweni, Jabu SDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Labuschagne, WA; Burke, Ivan D; Veerasamy, Namosha; Eloff, MMDate:Aug 2011Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it an ideal tool through ...Read more
Author:Mutemba, M; Mtsweni, Jabu S; Mkhonto, NNDate:Mar 2017Cyber attacks are on the increase in severity, complexity and frequency, negatively affecting the citizens, government, and businesses. Adversely, the security and Defence role-players in developing countries, such as South Africa, are short ...Read more
Author:Veerasamy, NamoshaDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Jansen van Vuuren, JCDate:Sep 2010The presentation addresses national security issues and the impact of cyber threats on the average citizen. It classifies cyber threats, analysis national security and provides security tips to safeguard the individual against cyber threats.Read more
Author:Robertson, J; Lessing, M; Nare, SDate:Jul 2008The military’s decision to move from proprietary software to commercially available software leaves the military’s Information Technology security vulnerable and potentially unprotected. To be sufficiently prepared to these threats, the ...Read more
Author:Grobler, MMDate:May 2010The best Information Security infrastructure cannot guarantee that intrusions or other malicious acts will not happen. It is necessary to know the facts and prepare beforehand knowing cyber threats and trends; knowing the broadband impact on ...Read more
Author:Grobler, M; Dlamini, Z; Ngobeni, Sipho J; Labuschagne, ADate:Aug 2011A large portion of the South African rural community only have intermittent access to computers and are not familiar, nor entirely comfortable, with the use of internet communication or electronic devices. The research conducted by the authors ...Read more