The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this competitive era, biometric systems provide more reliable security than traditional methods like passwords etc. Biometric systems perform person's authentication based on his physical traits. A number of biometric systems has been developed in the last few years such as fingerprints, hand and palm geometry, retina etc. Due to stability, uniqueness and non-replicable nature of vascular pattern,...
Electrocardiogram (ECG) is not only a vital sign of life but also contains important clinical information and even identical features. Similarly, ECG provides various significant characteristics to advocate its use as a biometric system such as uniqueness, permanence and liveness detection etc. This research provides with the complete systematic approach of ECG based person identification for general...
Biometrics is the process by which a person's physical, behavioral and psychological traits are identified and recorded by an electronic device of identity.Online handwritten signature verification is a biometric based security system. Most of the previous work is based on statistics of online signatures, local and global features. We proposed to test hybrid features on Japanese online dataset from...
Online Signature Verification is one of the most feasible biometric authentication techniques and is being widely researched upon. In this paper, some of the popular approaches towards Online Signature Verification are reviewed, and an abstraction of the general process involved in these approaches has been proposed. The most critical area in this process has identified to be that of feature selection...
The annual cost of Cybercrime to the global economy is estimated to be around $400 billion, in support of which Exploit Kits have been providing enabling technology since 2006. This paper reviews the recent developments in Exploit Kit capability and how these are being applied in practice. In doing so it paves the way for better understanding of the exploit kits economy that may better help in combatting...
With the increased numbers of mobile devices working in an ad hoc manner, there are many problems in secure routing protocols. Finding a path between source and destination faces more challenges in Mobile ad hoc network (MANET) environment because of the node movement and frequent topology changes, besides, the dependence on the intermediate nodes to relay packets. Therefore, trust technique is utilised...
Information and Communication Technology (ICT) can play a major role in improving the standard of education in South Africa. The increasing use of ICT (mobile phones, PCs, tablets) by South African school learners imposes the need for stringent ICT security awareness initiatives. These initiatives will protect school learners against the dangers associated with growing ICT use. This article presents...
In this paper we propose a security policy; based on normative multi-agents systems for complex applications. Our idea, focus on the notion of the norm inside a multi-agents system, permitting to influence and guides the agents community behavior, in order to ensure the security of the whole system. The adoption of the multi-agent paradigm is justified by the fact that the latter fits well with the...
In order to make the rule setting more convenient, this paper presents a self-learning method on the generation and optimization of industrial firewall rules. This method includes three parts: packet preprocessing, rule self-learning and rule optimization. First, packet capturing and analysis accomplish the data preprocessing; Secondly, by using the self-learning module, this method generates the...
The purpose of this study is to explore the need for digital forensic investigations at universities in South Africa and to determine if a university is forensically ready to conduct effective digital forensic investigations. For this research paper, the University of Cape Town is used as a case study. The research explores the existing digital forensic investigation process at the university and...
eDiscovery is a relatively recent development in the legal discovery system. However, little is known about the adoption of the practice in South Africa, and the challenges faced in its uptake. An exploratory study was undertaken to determine the status and challenges of eDiscovery in South Africa. Qualitative interviews were conducted with ten eDiscovery practitioners and it was ascertained that...
The characteristics of mobile devices are becoming increasingly like those of modern-day computers in terms of speed, memory, functionality, and external storage capabilities. These factors, in addition to the widespread availability of Internet access create an environment where social networking applications thrive. This paper focuses on conducting forensic analysis on two popular social networking...
The use of models has been one of the prevalent approaches to enhancing information security education and awareness in existing literature. Models provide step by step problem solving opportunities and are thus essential in security education and awareness activities. This paper categorized models for enhancing security education and awareness based on their stakeholder domains into: End-Users, Institutions...
Police impersonation is a serious crime against the state and is on the rise globally. One reason why it is easily accomplished is the lack of strong security features on police equipment. Police impersonation could place the citizens in a state of insecurity and upsurge social anxiety. Moreover, it could tarnish the image of the police and reduce their public confidence and trust. Thus, police officers'...
South Africa's lead-users predilections to tinker and innovate mobile banking services is driven by various constructs. Advanced technologies have made mobile banking services easy to use, attractive and beneficial. While this is welcome news to many, there are concerns that when lead-users tinker with these services, information security risks are exacerbated. The aim of this article is to present...
Despite the growing research effort to information systems security, the literature lacks an agreed upon typology, fundamental in summarising, directing, and predicting research. We adopt a refined methodological examining framework as the lens, through which the literature was examined in an effort to bridge this gap. A typology of four research types is identified, which will provide support in...
Growth in smartphone functionality and adoption makes such devices tempting targets for criminals. The device, but to a greater extent the information it contains, presents a valuable target for attack. It is therefore critical for smartphone users to take precautionary measures against threats, which may come from potential criminals or negligence by the user. Measures include awareness of vulnerabilities...
Nowadays, information plays a significant role in the enterprise organizations. Sensitive and vital data have a key character in organizing and storing within the database. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. The existence of Intrusion Detection Systems in the Data-Base (DB-IDS) is a necessity because enterprises...
Although blogging has been around for years, lifelogging and lifeblogging takes this technology and behaviour to the next level. Lifelogging is based on portable mini or even disguised devices which can capture and record everything the eye sees. This technology, coupled with the option of posting everything online, offers both benefits and privacy threats. Very few studies have been completed regarding...
Android-based smartphones are gaining significant advantages on its counterparts in terms of market share among users. The increasing usage of Android OS make it ideal target for attackers. There is an urgent need to develop solutions that guard the user's privacy and can monitor, detect and block these Eavesdropping applications. In this paper, two proposed paradigm are presented. The first proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.