Conveners
ISSA: Cybersecurity 1
- Chair: Jan Eloff (University of Pretoria)
ISSA: Cybersecurity 2
- Chair: Kerry-Lynn Thomson (Nelson Mandela University)
ISSA: 3
- Chair: Barry Irwin (Noroff University)
ISSA: 4
- Mariana Gerber (Nelson Mandela University)
ISSA: 5
- Chair: Reinhardt Botha (Noroff University College & Nelson Mandela University)
Digital forensic investigation (DFI) and linguistic analysis presents unique challenges and opportunities. The study examines how DFI has evolved, noting key theories and models. These are then evaluated based on compliance with established standards and their level of comprehensiveness in terms of addressing important aspects of an investigation. Linguistic analysis of cybercrimes is then...
The rapid adoption of digital assets has revolutionised the global financial landscape, bringing new opportunities and challenges. In South Africa, digital asset adoption has surged,
driven by economic factors and a tech-savvy population. However, this growth has outpaced regulatory development, particularly around tax compliance. This paper proposes a
conceptual model aimed at addressing...
The development of secure mobile applications is a crucial and complex task. This research focuses on threat modelling techniques to enhance mobile application security. A technique is proposed to analyse mobile application vulnerabilities, categorised by mobile application architectural layers, and classify vulnerabilities using STRIDE and DREAD. By identifying and scrutinising...
Visualisation techniques to aid in email forensic investigations was proposed in the literature, often social
network graphs. Current literature does not deal with the interpretation and insights that can be gained from
the graphs. When many nodes are depicted in such a graph, it becomes difficult to extract useful insights
from social network graphs. The research that will be presented at...
This paper presents the design, implementation, and comprehensive evaluation of a decentralized blockchain-based voting system aimed at revolutionizing electronic voting (e-voting). Leveraging blockchain technology, the system offers a transparent, secure, and publicly verifiable voting platform, addressing key limitations found in traditional e-voting approaches. The systememploys Proof of...
This research investigates changes in Internet Background Radiation (IBR) by analysing data captured from network telescopes. Network telescopes provide a unique insight into unsolicited network traffic and can be indicative of widespread malicious activity. The primary focus of the study is on a comparative analysis between network data from 2017 and 2023, captured from the same IP netblock....
Recent Artificial Intelligence(AI) advancements, notably in Large Language Models(LLMs), have enhanced Natural Language Processing(NLP) capabilities like Text-to-SQL. Businesses are increasingly using LLMs for domain-specific applications such as chatbots, but this raises security concerns including data access control. This research addresses these concerns by developing a secure access...
In the contemporary digital landscape, organisations are increasingly undertaking complex Digital Transformation initiatives to enhance, among other aspects, operational efficiency and drive innovation. However, these transformations expose organisations to heightened risks related to digital crimes. Traditional Digital Forensic Readiness frameworks fail to effectively integrate within the...
In recent years, the rising issue of burnout and the new phenomenon of quiet quitting have emerged as major concerns within the workforce, espe-cially among cybersecurity professionals. These phenomena not only undermine employee well-being, but also the security of information systems. Addressing the challenges of these phenomena requires an understanding of the un-underlying organisational...
In the modern era, the understanding of ransomware should not be limited to its technical aspects. Still, it must also incorporate an understanding of the covert and malicious practices of the ransomware threat actors behind it. By drawing from the strategic wisdom of Sun Tsu, the necessity of understanding the motivations and strategies of one’s adversaries to better defend oneself has become...
The increase in cybersecurity incidents is a growing concern for governments worldwide, especially in developing countries. Government institutions are among the top targets of cyberattacks. To address cybersecurity issues, various tools and frameworks have been developed to assess the level of cybersecurity maturity and commitments. Despite the calls on governments to develop and implement...
This paper conducts a rapid review using the adapted SVOT
(Strengths, Vulnerabilities, Opportunities, Threats) framework to synthesize current literature on cybersecurity in higher education institutions (HEIs). The review addresses (1) inherent strengths that enable HEIs to adopt robust cybersecurity measures, (2) specific vulnerabilities exposing HEIs to cyber threats, (3) opportunities to...
The current digital age has resulted in a surge in the use of Information and Communication Technology (ICT) tools that collect, store, and transmit huge volumes of sensitive data. Thus, sensitive data protection is a critical issue for all organisations in South Africa, including public schools. The problem is that schools often prioritize the benefits of using these ICT tools while...
Abstract: Cyberattacks frequently target higher educational institutions, making cybersecurity awareness and resilience critical for students. However, limited research exists on cybersecurity awareness, attitudes, and resilience among students in higher education. This study addresses this gap using the Theory of Planned Behavior as a theoretical framework. A modified Human Aspects of...
Cyber security is now commonly encountered as a focal topic for ac- ademic degrees. However, the presence and level of representation of relevant sub-topics within such degrees can vary significantly, and as a consequence the resulting student experience and graduate perception of what cyber security is and what it involves can be similarly varied. This paper examines the situation, based upon...