Table of Contents - Day 2 of Conference Programme

Day 2 – Tuesday, 7 July 2009

 12:30-13:30

Stream 7 –  
(
Reviewed Papers)

Stream 8

(Reviewed Papers)

13:30-14:00

An Introduction to Emerging Threats and Vulnerabilities to Create User Awareness

Namosha Veerasamy and Barend Taute

Automated Firewall Rule Set Generation Through Passive Traffic Inspection

Georg-Christian Pranschke, Barry Irwin and Richard Barnett

14:00-14:30

A Survey of Computer Crime and Security in South Africa

Adrie Stander, A Dunnet and J Rizzo

Phishing: How an Organization can Protect Itself

Edwin Frauenstein and Rossouw von Solms

14:30-15:00

Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks

Jacqui Chetty and Marijke Coetzee

A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems

Richard Barnett and Barry Irwin

 

Stream 9 -
(
Reviewed Papers)

Stream 10 -
(
Reviewed Papers)

15:30–16:00 

E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division)

Ryno Boshoff and Johan van Niekerk

Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?

Rabelani Dagada, Mariki Eloff and Lucas Venter

16:00-16:30

Investigating identity concealing and email tracing techniques

Ickin Vural and Hein Venter

Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process Improvisation

Kennedy Njenga and Irwin Brown

16:30-17:00

RBAC Enhanced Presence Handling

Rudi Victor, Andrew Rutherford and Reinhardt Botha

Integrating Information Security with Information System Architecture and Administration Curricula

Erik Hjelmas, Nils Kalstad Svendsen and Stephen D. Wolthusen