Author:Veerasamy, Namosha; Grobler, MDate:Oct 2010Cyberterrorism addresses the convergence of the fear-causing world of terrorism with the abstract realm of cyberspace, computers and networks. While cyberterrorism can be executed using various technical security exploits, it inherently stems ...Read more
Author:Phahlamohlaka, Letlibe J; Modise, M; Nengovhela, NDate:Oct 2010Since it was coined in the early eighties following the Maitland commission for worldwide telecommunications development, much has been written about the concept of digital divide. Everything to date in the literature about the subject point ...Read more
Author:Oosthuizen, Rudolph; Burke, Ivan D; Roodt, JDate:Oct 2010This paper investigates the effect of different Command and Control Concepts (C2) on the outcome of military engagements. The C2 concepts from literature were found to be based on the OODA loop or derivatives thereof. Agent Based Modelling ...Read more
Author:Decloedt, HE; Van Heerden, Renier PDate:Oct 2010This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, ...Read more
Author:Grobler, MDate:Oct 2010Strategic information security is becoming a more prominent aspect of modern day living. With the strong digital component that forms part of modern day business, the multiplicity of security risks and the emergence of increasingly complex ...Read more
Author:Lombard, NDate:Oct 2010Military aircraft in the battlefield are under constant threat from missile attacks. Technology such as infra-red countermeasures are used to protect against these threats. Measurements, modelling and simulation are used by the military to ...Read more