Conveners
ISSA: Cybersecurity 1
- Chair: Jan Eloff (University of Pretoria)
ISSA: Cybersecurity 2
- Chair: Kerry-Lynn Thomson (Nelson Mandela University)
ISSA: 3
- Chair: Barry Irwin (Noroff University)
ISSA: 4
- Mariana Gerber (Nelson Mandela University)
ISSA: 5
- Chair: Reinhardt Botha (Noroff University College & Nelson Mandela University)
Digital forensic investigation (DFI) and linguistic analysis presents unique challenges and opportunities. The study examines how DFI has evolved, noting key theories and models. These are then evaluated based on compliance with established standards and their level of comprehensiveness in terms of addressing important aspects of an investigation. Linguistic analysis of cybercrimes is then...
Cyberattacks have been an ever-increasing threat against the cyber infrastructure of organisations. The act of exploiting known network vulnerabilities appears to be highly appealing to hackers where their potential payout is to find and collect valuable data housed by an organisation. To compensate for this matter, security teams can design and deploy highly advanced security tools to thwart...
The rapid adoption of digital assets has revolutionised the global financial landscape, bringing new opportunities and challenges. In South Africa, digital asset adoption has surged,
driven by economic factors and a tech-savvy population. However, this growth has outpaced regulatory development, particularly around tax compliance. This paper proposes a
conceptual model aimed at addressing...
The development of secure mobile applications is a crucial and complex task. This research focuses on threat modelling techniques to enhance mobile application security. A technique is proposed to analyse mobile application vulnerabilities, categorised by mobile application architectural layers, and classify vulnerabilities using STRIDE and DREAD. By identifying and scrutinising...
Visualisation techniques to aid in email forensic investigations was proposed in the literature, often social
network graphs. Current literature does not deal with the interpretation and insights that can be gained from
the graphs. When many nodes are depicted in such a graph, it becomes difficult to extract useful insights
from social network graphs. The research that will be presented at...
Current corporate governance literature emphasizes providing information that maintains integrity to demonstrate accountability through assurance. The Institute of Directors in Southern Africa (IDSA) suggests the implementation of a Combined Assurance Model (CAM) that includes the usage of various assurance controls to support the integrity of information through a strong control environment....
Abstract. The present study investigates if the digital forensics report can be generated automatically by using some of the artificial intelligence techniques, specifically the natural language processing. A model has been developed to assess if it is feasible to automate the generation of a digital forensic report using artificial intelligent techniques. One of the main purposes for this...
This paper presents the design, implementation, and comprehensive evaluation of a decentralized blockchain-based voting system aimed at revolutionizing electronic voting (e-voting). Leveraging blockchain technology, the system offers a transparent, secure, and publicly verifiable voting platform, addressing key limitations found in traditional e-voting approaches. The systememploys Proof of...
This research investigates changes in Internet Background Radiation (IBR) by analysing data captured from network telescopes. Network telescopes provide a unique insight into unsolicited network traffic and can be indicative of widespread malicious activity. The primary focus of the study is on a comparative analysis between network data from 2017 and 2023, captured from the same IP netblock....
Recent Artificial Intelligence(AI) advancements, notably in Large Language Models(LLMs), have enhanced Natural Language Processing(NLP) capabilities like Text-to-SQL. Businesses are increasingly using LLMs for domain-specific applications such as chatbots, but this raises security concerns including data access control. This research addresses these concerns by developing a secure access...
In the contemporary digital landscape, organisations are increasingly undertaking complex Digital Transformation initiatives to enhance, among other aspects, operational efficiency and drive innovation. However, these transformations expose organisations to heightened risks related to digital crimes. Traditional Digital Forensic Readiness frameworks fail to effectively integrate within the...
The 4th and 5th industrial revolutions are improving the functioning of the working environment for different industries. However, it also introduces security and privacy challenges that lead to cybercrime which negatively impacts the economy. This article presents a comprehensive analysis of the usage of Zero Knowledge Proofs (ZKP) to protect data in the major technologies for the 4th and 5th...
Biometrical authentication systems are gaining prominence and have become increasingly
important to ensure compliance with privacy and safety regulations. In this paper, keystroke dynamics as a
behavioral biometric approach to user authentication is evaluated in terms of the impact that stress may have
on the typing pattern of a user. To achieve this, several experiments were conducted with...
In recent years, the rising issue of burnout and the new phenomenon of quiet quitting have emerged as major concerns within the workforce, espe-cially among cybersecurity professionals. These phenomena not only undermine employee well-being, but also the security of information systems. Addressing the challenges of these phenomena requires an understanding of the un-underlying organisational...
In the modern era, the understanding of ransomware should not be limited to its technical aspects. Still, it must also incorporate an understanding of the covert and malicious practices of the ransomware threat actors behind it. By drawing from the strategic wisdom of Sun Tsu, the necessity of understanding the motivations and strategies of one’s adversaries to better defend oneself has become...
The increase in cybersecurity incidents is a growing concern for governments worldwide, especially in developing countries. Government institutions are among the top targets of cyberattacks. To address cybersecurity issues, various tools and frameworks have been developed to assess the level of cybersecurity maturity and commitments. Despite the calls on governments to develop and implement...
Peer-to-peer (P2P) energy markets are emerging as a promising solution to address the challenges faced by traditional energy systems. However, the decentralised nature of these markets necessitates robust trust mechanisms to ensure secure and reliable energy transactions. This paper presents a comprehensive review of trust requirements and trust-building mechanisms in P2P energy markets. It...
This paper conducts a rapid review using the adapted SVOT
(Strengths, Vulnerabilities, Opportunities, Threats) framework to synthesize current literature on cybersecurity in higher education institutions (HEIs). The review addresses (1) inherent strengths that enable HEIs to adopt robust cybersecurity measures, (2) specific vulnerabilities exposing HEIs to cyber threats, (3) opportunities to...
The current digital age has resulted in a surge in the use of Information and Communication Technology (ICT) tools that collect, store, and transmit huge volumes of sensitive data. Thus, sensitive data protection is a critical issue for all organisations in South Africa, including public schools. The problem is that schools often prioritize the benefits of using these ICT tools while...
Abstract: Cyberattacks frequently target higher educational institutions, making cybersecurity awareness and resilience critical for students. However, limited research exists on cybersecurity awareness, attitudes, and resilience among students in higher education. This study addresses this gap using the Theory of Planned Behavior as a theoretical framework. A modified Human Aspects of...
Cyber security is now commonly encountered as a focal topic for ac- ademic degrees. However, the presence and level of representation of relevant sub-topics within such degrees can vary significantly, and as a consequence the resulting student experience and graduate perception of what cyber security is and what it involves can be similarly varied. This paper examines the situation, based upon...