dc.contributor.author |
Veerasamy, Namosha
|
|
dc.contributor.author |
Taute, B
|
|
dc.date.accessioned |
2009-08-17T13:30:02Z |
|
dc.date.available |
2009-08-17T13:30:02Z |
|
dc.date.issued |
2009-04 |
|
dc.identifier.citation |
Veerasamy, N and Taute, B. 2009. Introduction to emerging threats and vulnerabilities to create user awareness. Information Security South Africa (ISSA2009) Conference, University of Johannesburg, Gauteng, South Africa, 6 - 8 July, 2009. pp 12 |
en |
dc.identifier.isbn |
978-1-86854-740-1 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/3534
|
|
dc.description |
Information Security South Africa (ISSA2009) Conference, University of Johannesburg, Gauteng, South Africa, 6 - 8 July, 2009 |
en |
dc.description.abstract |
With technological change and advancement, attackers are increasingly becoming more sophisticated in their attack strategies and techniques. Other global factors and developments also impact the line of attack. This paper provides an introduction to the most current, pertinent attack strategies and trends. It aims to create an awareness of emerging areas that should be better studied and understood. The paper addresses the blurring lines of cyber crime, information warfare and cyber terror to indicate the key concerns at a national, commercial, governmental and individual level. Thus, the paper proposes and discusses topical security threats to elucidate their methodology and gauge their impact such that further strategic, operational and technical measures can be taken |
en |
dc.language.iso |
en |
en |
dc.publisher |
Information Security South Africa |
en |
dc.subject |
Cyber-terrorism |
en |
dc.subject |
Cyber-crime |
en |
dc.subject |
Information warfare |
en |
dc.subject |
Cyber-terror |
en |
dc.subject |
ISSA 2009 |
en |
dc.subject |
Information security |
en |
dc.subject |
Security threats |
en |
dc.title |
Introduction to emerging threats and vulnerabilities to create user awareness |
en |
dc.type |
Conference Presentation |
en |
dc.identifier.apacitation |
Veerasamy, N., & Taute, B. (2009). Introduction to emerging threats and vulnerabilities to create user awareness. Information Security South Africa. http://hdl.handle.net/10204/3534 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha, and B Taute. "Introduction to emerging threats and vulnerabilities to create user awareness." (2009): http://hdl.handle.net/10204/3534 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N, Taute B, Introduction to emerging threats and vulnerabilities to create user awareness; Information Security South Africa; 2009. http://hdl.handle.net/10204/3534 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Veerasamy, Namosha
AU - Taute, B
AB - With technological change and advancement, attackers are increasingly becoming more sophisticated in their attack strategies and techniques. Other global factors and developments also impact the line of attack. This paper provides an introduction to the most current, pertinent attack strategies and trends. It aims to create an awareness of emerging areas that should be better studied and understood. The paper addresses the blurring lines of cyber crime, information warfare and cyber terror to indicate the key concerns at a national, commercial, governmental and individual level. Thus, the paper proposes and discusses topical security threats to elucidate their methodology and gauge their impact such that further strategic, operational and technical measures can be taken
DA - 2009-04
DB - ResearchSpace
DP - CSIR
KW - Cyber-terrorism
KW - Cyber-crime
KW - Information warfare
KW - Cyber-terror
KW - ISSA 2009
KW - Information security
KW - Security threats
LK - https://researchspace.csir.co.za
PY - 2009
SM - 978-1-86854-740-1
T1 - Introduction to emerging threats and vulnerabilities to create user awareness
TI - Introduction to emerging threats and vulnerabilities to create user awareness
UR - http://hdl.handle.net/10204/3534
ER -
|
en_ZA |