Table of Contents - Day 1 - Wednesday 14 August 2013

Stream 1 –
(
Reviewed Papers)

Stream 2 –
(Reviewed Papers)

Network Security

Session chair:

Information security awareness and governance

Session chair:

Amber: A Zero-Interaction Honeypot and Network Enforcer with Modular Intelligence

Adam Schoeman

A Software Gateway to Affordable and Effective Information Security Governance in SMMEs

Jacques Coertze and Rossouw von Solms

A High-level Architecture for Efficient Packet Trace Analysis on GPU Co-processors

Alastair Nottingham and Barry Irwin

Factors Affecting User Experience with Security Features: A Case Study of an Academic Institution in Namibia

Fungai Bhunu Shava and Darelle van Greunen

Real-time Distributed Malicious Traffic Monitoring for Honeypots and Network Telescopes

Samuel Oswald Hunter, Barry Irwin and Etienne Stalmans

Information Security Risk Management in Small- Scale Organisations: A Case Study of Secondary Schools Computerised Information Systems

Moses Moyo, Hanifa Abdullah and Rita Nienaber

Stream 3 –
(
Reviewed Papers)

Stream 4 –
(Reviewed Papers)

Digital Forensics

Session chair: Dr Wynand van Staden

Cloud Security and Organisational Security

Session chair: Professor Isaac Osunmakinde

Digital Forensic Readiness in the Cloud

Philip Trenwith and Hein Venter

Insider Threat Detection Model for the Cloud

Lucky Nkosi, Paul Tarwireyi and Matthew Adigun

Implementation Guidelines for a Harmonised Digital Forensic Investigation Readiness Process Model

Aleksandar Valjarevic and Hein Venter

Selection and Ranking of Remote Hosts for Digital Forensic Investigation in a Cloud Environment

George Sibiya, Hein Venter and Thomas Fogwill

Towards a Framework for Enhancing Potential Digital Evidence Presentation

Nickson M. Karie and Hein S. Venter

A Compliant Assurance Model for Assessing Cloud-based E-Commerce Systems

Thembekile Mayayise and Isaac Osunmakinde

Testing the Harmonised Digital Forensic Investigation Process Model using an Android Mobile Phone

Stacey Omeleze and Hein. S. Venter

Visualization Of A Data Leak

Ignus Swart, Marthie Grobler and Barry Irwin

Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions

Mahmood Al Fahdi

Social Engineering from a Normative Ethics Perspective

Francois Mouton, Mercia Malan and Hein Venter