Author:Roodt, JHS; Oosthuizen, Rudolph; Jansen van Vuuren, JCDate:Apr 2010This investigation was launched firstly to direct current Information Warfare definition and capability management activities toward establishing a Require Operational Capability (ROC) statement for a JCD capability, and secondly to provide ...Read more
Author:Grobler, M; Jansen van Vuuren, JDate:Aug 2010Africa has recently seen explosive growth in information and communication technologies, making cyber crime a reality in this part of the world. This paper investigates the possibility of another increase in cyber crime as a result of the ...Read more
Author:Mtsweni, Jabu S; Thaba, James MDate:2022Cyberspace has been designated by organizations such as NATO as the fifth domain for battlespace, and many nations are already having and/or building their capabilities in the cyber defence environment in order to protect and defend their ...Read more
Author:Grobler, M; Van Vuuren, JJDate:Dec 2009Combating Transnational & Cross Border Crime in Africa 2009, Southern Sun Hotel OR Tambo International Airport 8 - 10 December 2009Read more
Author:Veerasamy, NamoshaDate:Sep 2020Technological advancements continue to progress and so too grows the prospect of cyberterrorism. Hacking tools are growing in sophistication, and agitated terrorist groups may look for an innovative outlet for their political, religious or ...Read more
Author:Taute, BDate:06 Jun 2009In his keynote address on the DST-funded Information Security Centre of Competence, the speaker concentrates on four important issues. These refer to threats and vulnerabilities in Cyberspace (that encompasses all forms of networked, digital ...Read more
Author:Labuschagne, WA; Eloff, MMDate:Jul 2014Using cyberspace to conduct business and personal duties has become ubiquitous to an interconnected society. The use of information technology has provided humanity with a platform to evolve and contribute to the advancement of society. However ...Read more
Author:Veerasamy, NamoshaDate:Aug 2010Cyberterrorism represents the convergence of the virtual world of cyberspace and the intimidation techniques of terrorism. To better understand why cyber terrorist acts are committed, this paper investigates the motivation behind terrorism ...Read more
Author:Phahlamohlaka, Letlibe J; Théron, J; Aschmann, MJDate:2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Maasdorp, FDV; Du Plessis, WPDate:Nov 2012In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper ...Read more
Author:Mtsweni, Jabu SDate:Oct 2023Cyber-attacks continue to evolve, circumventing modern security solutions and exploiting discovered software vulnerabilities. Businesses and governments tend to respond in a reactive manner when dealing with these attacks, mostly due to limited ...Read more