Table of Contents - Day 1 - Wednesday 13 August 2014

 

Stream 1 – Forensics & Information Security Cultures
(
Reviewed Papers)

Session Chair: Bobby Tait

Stream 2 – Network Security
(Reviewed Papers)

Session Chair: Reinhardt Botha

13:30-14:00

Information Security Culture: A General Living Systems Theory Perspective

Rayne Reid, Johan Van Niekerk and Karen Renaud

Towards a Sandbox for the Deobfuscation and Dissection of PHP-based Malware

Peter Wrench

14:00-14:30

From Information Security Cultures to Cyber security Cultures: Organizations to Societies

Rayne Reid and Johan Van Niekerk

An Exploration of Geolocation and Traffic Visualisation Using Network Flows

Sean Pennefather and Barry Irwin

14:30-15:00

An Investigation into Reducing Third Party Privacy Breaches During the Investigation of Cybercrime

Wynand van Staden

Security Foundation for a Distributed Cabin Core Architecture

Nicolai Kuntze, Carsten Rudolph and Oliver Hanka

 

Stream 3 – Security in Education & IT Governance
(
Reviewed Papers)

Session Chair: Wynand van Staden

Stream 4 – Social Engineering
(Reviewed Papers)

Session Chair: Louise Leenen

15:30-16:00

Information Security Assurance Model (ISAM) for a Higher Education Examination Paper Preparation Process

Miemie Mogale, Mariana Gerber, Mariana Carroll and Rossouw von Solms

Considering the influence of human trust in practical social engineering exercises

Wayne Kearney and Hennie Kruger

16:00-16:30

The Murky Waters of IT Governance

Jacques Coertze and Rossouw von Solms

Social Engineering Attack Framework

Francois Mouton, Mercia Malan, Louise Leenen and Hein Venter

16:30-17:00

Concerns Regarding Service Authorization by IP Address using Eduroam

Luzuko Tekeni, Kerry-Lynn Thomson and Reinhardt Botha

Combatting Phishing: A Holistic Human Approach

Edwin Donald Frauenstein and Rossouw von Solms