Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Paper title
Author name Day 1 Day 2 Day 3
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 2 of Conference Programme
Day 2 – Tuesday, 7 July 2009
12:30-13:30
Stream 7 – (Reviewed Papers)
Stream 8 –
(Reviewed Papers)
13:30-14:00
An Introduction to Emerging Threats and Vulnerabilities to Create User Awareness
Namosha Veerasamy and Barend Taute
Automated Firewall Rule Set Generation Through Passive Traffic Inspection
Georg-Christian Pranschke, Barry Irwin and Richard Barnett
14:00-14:30
A Survey of Computer Crime and Security in South Africa
Adrie Stander, A Dunnet and J Rizzo
Phishing: How an Organization can Protect Itself
Edwin Frauenstein and Rossouw von Solms
14:30-15:00
Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks
Jacqui Chetty and Marijke Coetzee
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems
Richard Barnett and Barry Irwin
Stream 9 - (Reviewed Papers)
Stream 10 - (Reviewed Papers)
15:30–16:00
E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division)
Ryno Boshoff and Johan van Niekerk
Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?
Rabelani Dagada, Mariki Eloff and Lucas Venter
16:00-16:30
Investigating identity concealing and email tracing techniques
Ickin Vural and Hein Venter
Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process Improvisation
Kennedy Njenga and Irwin Brown
16:30-17:00
RBAC Enhanced Presence Handling
Rudi Victor, Andrew Rutherford and Reinhardt Botha
Integrating Information Security with Information System Architecture and Administration Curricula
Erik Hjelmas, Nils Kalstad Svendsen and Stephen D. Wolthusen