Author:Van Heerden, Renier P; Leenen, L; Irwin, BDate:Nov 2013In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through ...Read more
Author:Veerasamy, NamoshaDate:Apr 2009Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to ...Read more
Author:Veerasamy, Namosha; Grobler, MDate:Oct 2010Cyberterrorism addresses the convergence of the fear-causing world of terrorism with the abstract realm of cyberspace, computers and networks. While cyberterrorism can be executed using various technical security exploits, it inherently stems ...Read more
Author:Baloyi, ErrolDate:Mar 2024In recent years, cyberspace has been shaped by a rapid and transformative technological evolution, which ushered in an era characterised by unparalleled connectivity and innovation. However, this remarkable progress has brought a concerning ...Read more
Author:Grobler, MDate:Oct 2010Strategic information security is becoming a more prominent aspect of modern day living. With the strong digital component that forms part of modern day business, the multiplicity of security risks and the emergence of increasingly complex ...Read more
Author:Veerasamy, NamoshaDate:Mar 2009Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. Cyber-terrorism reflects a current concern in the way terrorists will seek to strike the innocent and wreak havoc. Since explosives are no longer the ...Read more