Navigation

 

Information Security Studies

This webpage has a repository of links and files related to the study of information security, information warfare, electronic warfare, and critical infrastructure protection.

Contents

Information Security

Information Operations

Students and Research

Research Output

Documents and Files

Links

Contact


Information Security

The importance of information security is rapidly increasing due to the amount of information that is made available on networks that are connected to the internet, and the reliance on the information systems and the data that is stored, manipulated and transported by them. In the last 10-20 years, there has been a significant increase in the amount of cyber-crime, and we have seen the rise of information warfare and the threat of cyber-terrorism, which has prompted many nations to seriously investigate the protection of its critical infrastructures from information or computer based attacks. It is therefore essential to provide security to ensure the confidentiality, integrity and availability of the information and information systems.

Back to top


 Information Operations

Information operations encompass a variety of disciplines that may be applied to military, political, and corporate spheres with the aim of gaining a competitive advantage. Information operations may be seen to comprise of the following: information security & information warfare, knowledge management (including intelligence gathering and processing), political & crisis communications, propaganda & perception management, and other disciplines. 

Back to top


Students and Research

Honours Students 2008
Neil Skea – Wireless Network Security
Ryden Pillay - Students’ Attitude Towards Privacy and Trust on Social Networks
Vikendran Naiker - Awareness of Deterrent Anti-piracy Methods in South Africa: The Case of IS&T Honours Students at UKZN
Dheeren Naidoo - A Comparative Study of Students’ Awareness of Information Security

Honours Students 2009
Farhana Ismail - The Extent of Usage and Trust in Social Networking Sites
Mfanafuthi Mlambo - Peer to Peer File Sharing Using the University Network and Its Impact on Software Piracy
Neeanth Madanjit - The User Acceptance of Biometrics within the University of KwaZulu – Natal
Patrick Ndayizigamiye - The Impact of UKZN Information System Security on Students’ Privacy and Information Searching

Completed Masters Students
Harold Arumugam - Managing Computer Fraud and IT Risk in the Public Sector
Nurudeen Ajayi - Information Risk Management within Supply Chains

Current Masters Students
Kesevan Chettiar - To Develop a Conceptual Data Security Management Model for the Contact Centre Industry in South Africa
Sashen Govender - Reading Between the Lines: Cyber Forensic Strategies for Determining the Quality of Ethical Academic Writing
Zahra Bulbulia - The Use of Platform Appropriate Interactive Web 2.0 Tools on User Security Education

Completed PhD Students
Brett van Niekerk - Vulnerability Assessment of Modern ICT Infrastructure from an Information Warfare Perspective

Current PhD Students
Chris Skinner -  From Policy to Pracitce: Investigation of Communication Breakdowns in Emergency and Disaster Management Procedures in the Chemical Industry in South Africa
Kiru Pillay -  Do Web 2.0 Social Media Impact on Transnational Advocacy? A Study of South African Civil Society and Greenpeace
Nurudeen Ajayi - Information Assurance in Supply Chains

Current PostDoctoral Researchers
Brett van Niekerk - An Information Operation taxonomy and Curriculum for South Africa

Back to top 


Research Output

Ramluckan, T., and van Niekerk, B. (2009) “The Role of the Media in Joint Operations,” Military Information and Communications Symposium of South Africa 2009, Pretoria, 20-24 July.

Ramluckan, T., and van Niekerk, B. (2009) “The Terrorism/Mass Media Symbiosys,” Journal of Information Warfare, vol. 8, issue 2, pp. 1-12.

van Niekerk, B. (2009) “Interoperability in EW and CNO: Considerations for the African Continent,” Military Information and Communications Symposium of South Africa 2009, Pretoria, 20-24 July.

van Niekerk, B. (2009) “Training for Interoperability: The Role of Simulations and Simulators,” Military Information and Communications Symposium of South Africa 2009, Pretoria, 20-24 July.

van Niekerk, B., and Maharaj, M.S. (2009) “The Future Roles of EW in IW,” Aardvark Roost Big Crow Conference, Pretoria, 25-26 August.

van Niekerk, B., and Maharaj, M.S. (2009) “Information Operations Education for South Africa,” 3rd Annual Teaching and Learning Conference, Durban, 21-23 September, pp. 206-224.

Maharaj, M., and Naidoo, D. (2009) "A Comparative Study between Kenyan and South African Students," Business Management Conference, 5-9 November, UKZN.

Maharaj, M. and Pillay, R. (2009) "Students' Attitude Towards Privacy and Trust on Social Networks," Business Management Conference, 5-9 November, UKZN.

Skea, N. and Maharaj, M. (2009) "Wireless Network Security," Business Management Conferece, 5-9 November, UKZN.

van Niekerk, B., and Maharaj, M.S. (2009) “The Future Roles of Electronic Warfare in the Information Warfare Spectrum,” Journal of Information Warfare, vol. 8, issue 3, pp. 1-13.

van Niekerk, B., and Maharaj, M.S. (2010) “Information as a Strategic Asset in an Asymmetric Unconventional Conflict,” International Conference on Information Management and Evaluation, Cape Town, 25-26 March, pp. 413-421.

van Niekerk, B., and Maharaj, M.S. (2010) "Mobile Security from an Information Warfare Perspective," 9th Information Security South Africa Conference, Sandton, 2-4 August.

Ajayi, N., and Maharaj, M.S. (2010) "Mitigating Information Risk Within Supply Chains," International Research Symposium on Service Management, Mauritius, 24-27 August.

van Niekerk, B., and Maharaj, M.S. (2010) "Weaponisation of the Net," 12th Annual Conference on World Wide Web Applications (ZA-WWW 2010), Durban, 21-23 September.

Pillay, K., van Niekerk, B., and Maharaj, M.S. (2010) "Web 2.0 and its Implications for the Military," Workshop on the Uses of ICT in Warfare and the Safeguarding of Peace, Bela-Bela, 11 October.

van Niekerk, B., and Maharaj, M.S. (2011) "Infrastructure Vulnerability Analysis from and Information Warfare Perspective," South African Computer Lecturer's Association (SACLA 2011) Conference, Ballito, 6-8 July 2011.

van Niekerk, B., Ramluckan, T., and Maharaj, M.S., (2011) "Web 2.0 as an Attack Vector Against Strategic Security," 5th Military Information and Communications Symposium of South Africa (MICSSA 2011), Pretoria, 18-21 July 2011.

Skea, N., and Maharaj, M.S., "Wireless Network Security," Alternation, vol. 18, no. 1.

van Niekerk, B., Pillay, K., and Maharaj, M.S., (2011) "Analysing the Role of ICTs in the Tunisian and Egyptian Unrest from and Information Warfare Perspective," International Journal of Communications, vol. 5, pp. 1406-1416, Available at: http://ijoc.org/ojs/index.php/ijoc/article/view/1168/614

van Niekerk, B., and Maharaj, M.S., (2011) "Mobile Malware Trends," Business Management Conference, 28-29 September, UZKN Westville Campus.

van Niekerk, B. and Maharaj, M.S., (2011) "Relevance of Information Warfare Models to Critical Infrastructure Protection," Scientia Militaria, vol. 39, no.2, pp. 99-122, available at: http://scientiamilitaria.journals.ac.za/pub/article/view/114/147

van Niekerk, B. and Maharaj, M.S., (2011) "The IW Life Cycle Model," South African Journal of Information Management, vol. 13, no.1, available at: http://www.sajim.co.za/index.php/SAJIM/article/view/476

van Niekerk, B. and Maharaj, M.S., (2012) "A South Africa Perspective of Information Warfare and Cyber Warfare," in: Ventre, D. (ed.), Cyber Conflict: Competing National Perspectives, ISTE Wiley: London, pp. 279-296.

van Niekerk, B. and Maharaj, M.S., (2012) "Mobile Devices and the Military: Significant Threat or Useful Tool?" Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace, 16 August, pp. 21-28.

van Niekerk, B., Leenen, L., Ramluckan, T.,  and Maharaj, M.S., (2012) Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace, 16 August. 

van Niekerk, B. and Maharaj, M.S., (2012) "Vulnerability of South African Mobile Infrastructure to Information Warfare Attacks" Information Security South Africa (ISSA) Conference, 15-17 August.

van Niekerk, B. and Maharaj, M.S., (2012) "Mobile Devices and the Military: Significant Threat or Useful Tool?" Journal of Information Warfare, vol. 11, no. 2, pp. 1-11.

van Niekerk, B. (2012) "Managing and Analysing Social Media Campaigns and Events," Invited Paper: ZA-WWW 2012 Conference, 7-9 November.

Back to top


Documents and Files

Web 2.0 as an Attack Vector Against Strategic Security- MICSSA 2011 Presentation Presentation Slides 1.21MB  .PDF 

Web 2.0 and its Implications for the Military - Workshop on the Uses of ICT in Warfare and the Safeguarding of Peace Colour Slides 2.17MB  .PDF 

Weaponisation of the Net - ZA-WWW 2010  Colour Slides  0.9MB  .PDF

Mobile Security from an Information Warfare Perspective - 9th Information Security South Africe Conference  Colour Slides 1.3MB .PDF

Information as a Strategic Asset in Asymmetric Unconventional Conflicts - International Conference on Information Management and Evaluation 2010 Colour Presentation Slides  2.53MB  .PDF  Grayscale Slides with Notes  1.34MB  .PDF

Information Security Podcast - Business Managament Conference 13.5MB .MOV (Podcast)

Wireless Network Security - Business Management Conference 19.1MB .MOV (Podcast)

Vulnerability Assessment of Modern ICT Infrastructure from and Information Warfare Perspective  Podcast: IPod  Mobile

Information Operations Education for South Africa - Teaching and Learning Conference 2009 0.3MB .PDF

The Future of EW in IW - Aardvark AOC Conference August 2009 1.2MB .PDF

The Role of the Media in Joint Operations - MICSSA Conference 2009 0.2MB .PDF

Interoperability in CNO and EW - MICSSA Conference 2009 0.1MB .PDF

Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace 3.2MB .PDF

 

Please Login for documents from the Aardvark AOC Novemeber 2009 Conference.

Please contact us to request access.

Back to top


Links

Information Security Group Africa

eCrime Website  Tracking eCrime in South Africa

Interntational Conference on Information Management and Evaluation 27-28 April 2011

Information Security South Africa Conference Website  14-16 August 2013

ZA-WWW 2011 Conference Website 14-16 September 2011

Aarvark Roost - The South African Chapter of the Association of Old Crows  Electronic Warfare Advocacy Group

Computer Security Institute

MIT Open Courseware Website

ITWeb Security Blog

ITWeb Security Summit  7-9 May 2013

Infosec Island

Security Engineering by Ross Anderson - Download the first edition of the book and preview the second edition.

Simply Security Website - Information security, information warfare and cyberwarfare podcasts by Winn Schwartau.

RF GlobalNet Electronic Warfare Solution Center

SC Magazine  IT Security News

Wired Magazine

Information Warfare Monitor

Air University Cyberspace & Information Operations Study Center

IO Sphere Magazine/Journal  Air University Cyberspace & Information Operations Study Center

Information Security Resources

US Dept. Homeland Security: Critical Infrastructure and Key Resources

Cooperative Cyber Defense Centre of Excellence

International Journal of Communications and Information Security

OpenNet Initiative Internet Censorship and Surveillance Research

 

African Computer Emergency Response Teams:

ANSI / tunCERT Tunisian Computer Emergency Response Team

CERT-Africa

CERT-MU Mauritius Computer Emergency Response Team

CSIRT-KENYA Kenyan Computer Security Incident Response Team

Back to top


Contact

Prof Manoj Maharaj

Tel:   +27 (0)31 260 8003

Fax: +27 (0)31 260 7251

Email

 

Dr Brett van Niekerk

Tel:  +27 (0)31 260 8521

Fax: +27 (0)31 260 7251

Email

Back to top


Information Security Studies

The importance of information security is rapidly increasing due to the amount of information that is made available on networks that are connected to the internet, and the reliance on the information systems and the data that is stored, manipulated and transported by them. In the last 10-20 years, there has been a significant increase in the amount of cyber-crime, and we have seen the rise of information warfare and the threat of cyber-terrorism, which has prompted many nations to seriously investigate the protection of its critical infrastructures from information or computer based attacks. It is therefore essential to provide security to ensure the confidentiality, integrity and availability of the information and information systems.

This webpage has a repository of links and files related to the study of information security, information warfare, electronic warfare, and critical infrastructure protection.


Contact Webmaster | View the Promotion of Access to Information Act | View our Privacy Policy
© University of KwaZulu-Natal: All Rights Reserved