Recent Artificial Intelligence(AI) advancements, notably in Large Language Models(LLMs), have enhanced Natural Language Processing(NLP) capabilities like Text-to-SQL. Businesses are increasingly using LLMs for domain-specific applications such as chatbots, but this raises security concerns including data access control. This research addresses these concerns by developing a secure access...
This paper presents the design, implementation, and comprehensive evaluation of a decentralized blockchain-based voting system aimed at revolutionizing electronic voting (e-voting). Leveraging blockchain technology, the system offers a transparent, secure, and publicly verifiable voting platform, addressing key limitations found in traditional e-voting approaches. The systememploys Proof of...
This paper conducts a rapid review using the adapted SVOT
(Strengths, Vulnerabilities, Opportunities, Threats) framework to synthesize current literature on cybersecurity in higher education institutions (HEIs). The review addresses (1) inherent strengths that enable HEIs to adopt robust cybersecurity measures, (2) specific vulnerabilities exposing HEIs to cyber threats, (3) opportunities to...
The increase in cybersecurity incidents is a growing concern for governments worldwide, especially in developing countries. Government institutions are among the top targets of cyberattacks. To address cybersecurity issues, various tools and frameworks have been developed to assess the level of cybersecurity maturity and commitments. Despite the calls on governments to develop and implement...
The development of secure mobile applications is a crucial and complex task. This research focuses on threat modelling techniques to enhance mobile application security. A technique is proposed to analyse mobile application vulnerabilities, categorised by mobile application architectural layers, and classify vulnerabilities using STRIDE and DREAD. By identifying and scrutinising...
In the contemporary digital landscape, organisations are increasingly undertaking complex Digital Transformation initiatives to enhance, among other aspects, operational efficiency and drive innovation. However, these transformations expose organisations to heightened risks related to digital crimes. Traditional Digital Forensic Readiness frameworks fail to effectively integrate within the...
The current digital age has resulted in a surge in the use of Information and Communication Technology (ICT) tools that collect, store, and transmit huge volumes of sensitive data. Thus, sensitive data protection is a critical issue for all organisations in South Africa, including public schools. The problem is that schools often prioritize the benefits of using these ICT tools while...
Cyber security is now commonly encountered as a focal topic for ac- ademic degrees. However, the presence and level of representation of relevant sub-topics within such degrees can vary significantly, and as a consequence the resulting student experience and graduate perception of what cyber security is and what it involves can be similarly varied. This paper examines the situation, based upon...
In the modern era, the understanding of ransomware should not be limited to its technical aspects. Still, it must also incorporate an understanding of the covert and malicious practices of the ransomware threat actors behind it. By drawing from the strategic wisdom of Sun Tsu, the necessity of understanding the motivations and strategies of one’s adversaries to better defend oneself has become...
In recent years, the rising issue of burnout and the new phenomenon of quiet quitting have emerged as major concerns within the workforce, espe-cially among cybersecurity professionals. These phenomena not only undermine employee well-being, but also the security of information systems. Addressing the challenges of these phenomena requires an understanding of the un-underlying organisational...
Visualisation techniques to aid in email forensic investigations was proposed in the literature, often social
network graphs. Current literature does not deal with the interpretation and insights that can be gained from
the graphs. When many nodes are depicted in such a graph, it becomes difficult to extract useful insights
from social network graphs. The research that will be presented at...