Sciweavers

ISSA
2008
13 years 10 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
ISSA
2008
13 years 10 months ago
Bloom's Taxonomy for Information Security Education
The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged. However, many current user educati...
Johan Van Niekerk, Rossouw von Solms
ISSA
2008
13 years 10 months ago
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Stud
This paper intends to discuss and sift out current and important challenges in Information and Communication Technology (ICT) security for developing countries in the Sub-Saharan ...
Geoffrey Karokola, Louise Yngström
ISSA
2008
13 years 10 months ago
Spam Construction Trends
This paper replicates and extends Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution. A corpus of 169,274 spam email was collected over a period of fi...
Barry Irwin, Blake Friedman
ISSA
2008
13 years 10 months ago
The Use of File Timestamps in Digital Forensics
Digital evidence is not well perceived by the human senses. Crucial pieces of digital evidence may simply be missed by investigators as the forensic significance of seemingly unim...
Renico Koen, Martin S. Olivier
ISSA
2008
13 years 10 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
ISSA
2008
13 years 10 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier
ISSA
2008
13 years 10 months ago
A User Centric Model for Online Identity and Access Management
The problem today is that users are expected to remember multiple user names and passwords for different domains when accessing the Internet. Identity management solutions seek to...
Matthew Deas, Stephen Flowerday
ISSA
2008
13 years 10 months ago
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing
The approach to information security governance has predominantly followed a functionalist paradigm with emphasis placed on formalized rule structures and policy frameworks. The a...
Kennedy Njenga, Irwin Brown