GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Information security

 

News

CSIR Research Space is constantly being developed and populated. Please report any errors to Siphethile Muswelanto Constructive criticism and suggestions would be welcome.

Recent Submissions

  • Mtsweni, Jabu (CSIR, 2017-10)
    This presentation discusses how research and development can be used in an Industry 4.0 environment to enhance cybersecurity.
  • Taute, Barend JE (CSIR, 2017-10)
    This presentation discusses the work that has been done by the CSIR in order to improve cybersecurity in the South African industry. The CSIR's cybersecurity track record, RDI focus areas, key R&D partnerships as well as ...
  • Pennefather, S; Bradshaw, K; Irwin, Barry VW (SATNAC, 2017-09)
    Currently, network analytics requires direct access to network packets, normally through a third-party application, which means that obtaining realtime results is difficult. We propose the NFP-CPU heterogeneous framework ...
  • Lakha, D (CSIR, 2017-10)
    This presentation discusses why insider threats are considered one of the main threats to cybersecurity.
  • Strauss, P (CSIR, 2017-10)
    This presentation discusses cybercrimes in the banking sector, and how these crimes are profoundly different to traditional crime.
  • Burke, Ivan D; van Heerden, Renier P (IGI Global, 2017-10)
    Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly ...
  • Chindipha, SD; Irwin, Barry VW (SATNAC, 2017-09)
    The SQL Slammer worm is a self propagated computer virus that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic. An observation of network traffic captured in the Rhodes ...
  • Sweeney, M; Irwin, Barry VW (2017-09)
    As networks have grown, so has the data available for monitoring and security purposes. This increase in volume has raised significant challenges for administrators in terms of how to identify threats in amongst the large ...
  • Motara, YM; Irwin, Barry VW (2017-09)
    Finding a preimage for a SHA-1 hash is, at present, a computationally intractable problem. SAT-solvers have been useful tools for handling such problems and can often, through heuristics, generate acceptable solutions. ...
  • Pearson, D; Irwin, Barry VW; Herbert, A (2017-09)
    Malicious entities are constantly trying their luck at exploiting known vulnerabilities in web services, in an attempt to gain access to resources unauthorized access to resources. For this reason security specialists ...
  • Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NN (2017-09)
    This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous ...
  • Brown, Dane; Bradshaw, K (2017-09)
    In the new Digital Economy, mobile devices are increasingly 978-0-620-76756-9being used for tasks that involve sensitive and/or financial data. Hitherto, security on smartphones has not been a priority and furthermore, ...
  • Kingsley Bell, L; Mouton, Francois; Meyer, T (IEEE, 2017-03)
    The rapid development of smart-phone technology in recent years has lead to many smart-phone owners owning out-of-date devices, equipped with useful technologies, which are no longer in use. These devices are valuable ...
  • Frieslaar, Ibraheem; Irwin, Barry VW (ACM Digital Library, 2017-09)
    This research investigates changes in the electromagnetic (EM) signatures of a cryptographic binary executable based on compile-time parameters to the GNU and clang compilers. The source code is compiled and executed on ...
  • Baloyi, Ntsako; Kotze, Paula (IST-Africa, 2017-05)
    People engage with various technologies in their daily lives and become data subjects when they share personal information with software, devices, services or organisations. Sometimes individuals may be oblivious to the ...
  • Marivate, Vukosi; Moiloa, P (IEEE, 2016-11)
    The increasing prevalence of Social Media platform use has brought with it an explosion of new user generated public data. This data is centered around many, diverse topics. One theme of interest is how one can tap into ...
  • Masango, Mfundo G; Mouton, Francois; Antony, Palesa; Mangoale, Bokang C (IEEE, 2017-09)
    Websites have become a form of information distributors; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services ...
  • Dlamini, Nelisiwe P; Scott, MS; Nair, Kishor K (2017-06)
    The popularity of Crypto currencies has not gone unnoticed, Bitcoin which is an electronic payment system and Internet money, is a leading crypto currency and continues to grow from being popular amongst the people who ...
  • Pieterse, Heloise; Olivier, Marius; Van Heerden, Renier P (Springer, 2017-08)
    The widespread use and rich functionality of smartphones have made them valuable sources of digital evidence. Malicious individuals are becoming aware of the importance of digital evidence found on smartphones and may be ...
  • Pieterse, Heloise (Academic-bookshop.com, 2017-06)
    People are creatures of habit, favouring the familiar over unpredictability, which causes them to usually follow set patterns or routines. This is especially true for social interaction or communication where people tend ...

View more