GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Information security

 

News

CSIR Research Space is constantly being developed and populated. Please report any errors to Siphethile Muswelanto Constructive criticism and suggestions would be welcome.

Recent Submissions

  • Weiss, M; Botha, Adele; Herselman, Martha E; Loots, G (2017-05)
    Blockchain technology underpins a radical rethink of information privacy, confidentiality, security and integrity. As a decentralised ledger of transactions across a peer-to-peer network, the need for a central third party ...
  • Modupe, A; Celik, T; Marivate, Vukosi N; Diale, Melvin (IEEE, 2017-03)
    The growing use of informal social text messages on Twitter is one of the known sources of big data. These type of messages are noisy and frequently rife with acronyms, slangs, grammatical errors and non-standard words ...
  • Mokoena, Tshepiso; Lebogo, Ofentse; Dlaba, Asive; Marivate, Vukosi (IEEE, 2017-09)
    In many real world applications, human analysts are not only interested in the detected anomalies but are also interested in the reasons behind why they were flagged as anomalous. However, existing anomaly detectors provide ...
  • Van de Merwe, J; Mouton, Francois (CSCAN, 2017-11)
    Social engineering attacks present a material threat to the security of information systems. To date security professionals only manage the potential effects of a social engineering attack. Security professionals consider ...
  • Mouton, Francois; Teixeira, M; Meyer, T (IEEE, 2017-11)
    As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a ...
  • Mouton, Francois; Nottingham, Alastair T; Leenen, Louise; Venter, HS (IEEE, 2017-08)
    Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. In general, human operators are often highly susceptible to manipulation, and ...
  • Veerasamy, Nomosha; Labuschagne, William A (2017-12)
    We now live in a digital, interconnected world. Social media has emerged as a pervasive component of this digital age in which having an online presence dominates. Facebook, Twitter and LinkedIn all provide modern forms ...
  • Linklater, G; Smith, C; Connan, J; Herbert, A; Irwin, Barry VW (SATNAC, 2017-09)
    Attribute-based Access Control (ABAC) is an access control model where authorization for an action on a resource is determined by evaluating attributes of the subject, resource (object) and environment. The attributes are ...
  • Mtsweni, Jabu (CSIR, 2017-10)
    This presentation discusses how research and development can be used in an Industry 4.0 environment to enhance cybersecurity.
  • Taute, Barend JE (CSIR, 2017-10)
    This presentation discusses the work that has been done by the CSIR in order to improve cybersecurity in the South African industry. The CSIR's cybersecurity track record, RDI focus areas, key R&D partnerships as well as ...
  • Pennefather, S; Bradshaw, K; Irwin, Barry VW (SATNAC, 2017-09)
    Currently, network analytics requires direct access to network packets, normally through a third-party application, which means that obtaining realtime results is difficult. We propose the NFP-CPU heterogeneous framework ...
  • Lakha, D (CSIR, 2017-10)
    This presentation discusses why insider threats are considered one of the main threats to cybersecurity.
  • Strauss, P (CSIR, 2017-10)
    This presentation discusses cybercrimes in the banking sector, and how these crimes are profoundly different to traditional crime.
  • Burke, Ivan D; van Heerden, Renier P (IGI Global, 2017-10)
    Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly ...
  • Chindipha, SD; Irwin, Barry VW (SATNAC, 2017-09)
    The SQL Slammer worm is a self propagated computer virus that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic. An observation of network traffic captured in the Rhodes ...
  • Sweeney, M; Irwin, Barry VW (2017-09)
    As networks have grown, so has the data available for monitoring and security purposes. This increase in volume has raised significant challenges for administrators in terms of how to identify threats in amongst the large ...
  • Motara, YM; Irwin, Barry VW (2017-09)
    Finding a preimage for a SHA-1 hash is, at present, a computationally intractable problem. SAT-solvers have been useful tools for handling such problems and can often, through heuristics, generate acceptable solutions. ...
  • Pearson, D; Irwin, Barry VW; Herbert, A (2017-09)
    Malicious entities are constantly trying their luck at exploiting known vulnerabilities in web services, in an attempt to gain access to resources unauthorized access to resources. For this reason security specialists ...
  • Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NN (2017-09)
    This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous ...
  • Brown, Dane; Bradshaw, K (2017-09)
    In the new Digital Economy, mobile devices are increasingly 978-0-620-76756-9being used for tasks that involve sensitive and/or financial data. Hitherto, security on smartphones has not been a priority and furthermore, ...

View more