Brett van Niekerk

Brett van Niekerk
Durban University of Technology | dut · Department of Information Technology

PhD Information Systems
Cybersecurity and Information Warfare researcher

About

88
Publications
38,639
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
288
Citations
Citations since 2016
57 Research Items
235 Citations
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050

Publications

Publications (88)
Article
Published in GP-ORF Series, on FUTURE WARFARE AND TECHNOLOGY: ISSUES AND STRATEGIES. https://www.orfonline.org/wp-content/uploads/2022/11/GP-ORF_Future-Warfare-and-Technology1.pdf
Article
The ever-growing integration of Internet-of-Things (IoT) devices into our daily lives provides us with a level of convenience never before seen. However, the effects of attacks on these devices can be devastating. The discrete, low-powered nature of IoT devices makes their security a difficult problem to solve. To provide a solution, this work prop...
Conference Paper
https://www.diacc.ae/articlespdf/Article_08_Brett_van_Niekerk.pdf
Conference Paper
Full-text available
Cybersecurity and Artificial Intelligence (AI) are closely aligned; both domains are growing rapidly, they are interdependent and they face major challenges. Cybersecurity threats are of great concern globally and becoming increasingly difficult to address. AI is widely recognised to be crucial to the development of efficient cybersecurity measures...
Conference Paper
Antarctica is the last discovered continent, and is designated as a protected area for scientific research and peace and military operations are banned. Its status is governed by the 1959 Antarctic Treaty and subsequent agreements. These treaties related to Antarctica are cited as an example or a possible model for a treaty or international law for...
Conference Paper
The prevalence of digital communications results in the need for presenting digital evidence in legal and disciplinary hearings. Whilst South African legislation does provide some guidelines for the use of digital evidence, labour laws do not explicitly consider digital evidence and its role in disciplinary hearings is not explicitly guided. This m...
Conference Paper
Full-text available
Deepfakes pose a threat to many aspects of society, such as election manipulation, involuntary pornography and fraud by means of identity theft. This paper aims to determine if deepfake models which are pre-trained on older datasets are still able to accurately detect whether a video is real or a deepfake from a newer dataset. From a comprehensive...
Conference Paper
With the rapid expansion of social media, most notable events globally are recorded on one or more of the platforms. During the events of the Arab Spring uprisings, social media was seen to play a role in the protests. The role of social media increased in the Ukrainian anti-government protests of 2014 to 2015, and in the Fees Must Fall movement in...
Conference Paper
Full-text available
Cyber-operations have altered the nature of war and the applicability of international law to this new form of conflict has been widely debated; however, no clear consensus in this regard has been reached. Challenges that contribute to the uncertainty of international law's applicability to cyber-operations include the difficulty of attribution of...
Conference Paper
Full-text available
There has been an increasing prevalence of global cyber-attacks. Because of the possible breaches in information security, it has become pertinent that organisations change organisational and individual cultures to become more secure. However, there are challenges regarding the implementation of these processes within organisations. Organisations h...
Conference Paper
Full-text available
The purpose of this paper is to propose an ontology for intelligence, surveillance, target acquisition, and reconnaissance (ISTAR) activities in offensive cyber operations (OCO). An ontology is a formal model of the domain objects and the relationships between them. Ontology languages are available that are both human-readable and computer-executab...
Article
Published in the Journal of Information Warfare: Cybersecurity is often incorrectly assumed to be a purely technical field; however, there are numerous multidisciplinary aspects, such as, for example, human factors, legal, and governance issues. The broad scope, combined with other historical or bureaucratic factors, can provide challenges to resea...
Chapter
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies o...
Article
Published in the Journal of Information Warfare Cyber-influence and 'fake news' have become common terms due to high profile incidents such as alleged tampering in the 2016 US elections. The majority of academic studies of cyber-influence operations focus on mechanisms to conduct them or the security and societal impact thereof and fail to conside...
Article
In: Journal of Information Warfare
Chapter
The use of social media in advocacy, and particularly transnational advocacy, raises concerns of privacy and security for those conducting the advocacy and their contacts on social media. This chapter presents high-level summaries of cases of social media in advocacy and activism from the perspectives of information warfare and information security...
Chapter
The approach that the organization uses to manage its cyber-risk to its workforce, information, systems, and networks is paramount to ensure sustainability and continuity in the Fourth Industrial Revolution. Improving cyber-resiliency in the organization reduces the chance of future threats and attacks and builds better capability. Cyber resilience...
Chapter
The Fourth Industrial Revolution is seen as a digital one, extending the previous information revolution. This is exhibited by the pervasive connectivity of many smart devices, known as the internet of things (IoT). The data generated and access created by these devices provides opportunities in an information warfare context by providing new avenu...
Chapter
The frequency and sophistication of cyberthreats and attacks are increasing globally. All organizations including governments are at risk as more devices are connected to a growing network coverage. There is no doubt that the new technologies in the Fourth Industrial Revolution bring numerous opportunities for smarter and efficient ways of doing bu...
Chapter
The approach that the organization uses to manage its cyber-risk to its workforce, information, systems, and networks is paramount to ensure sustainability and continuity in the Fourth Industrial Revolution. Improving cyber-resiliency in the organization reduces the chance of future threats and attacks and builds better capability. Cyber resilience...
Chapter
With the continuing evolution of cyber threats, it is only a matter of time before an organisation will suffer a major breach or there is an incident of national significance. This necessitates monitoring to detect possible incidents and mechanisms to respond and recover from breaches. This chapter provides an overview of structures to aid in threa...
Chapter
For many countries the physical transport infrastructure is critical to the economy, with ports forming a gateway for the majority of trade, and rail and road used to distribute goods. Airlines are crucial to the tourism industry. Whilst the focus of cyber-defense is on financial networks and the power grid, recent incidents illustrate that the tra...
Chapter
The use of social media in advocacy, and particularly transnational advocacy, raises concerns of privacy and security for those conducting the advocacy and their contacts on social media. This chapter presents high-level summaries of cases of social media in advocacy and activism from the perspectives of information warfare and information security...
Article
Full-text available
Internet-based attacks have become prevalent and are expected to increase as technology ubiquity increases. Consequently, cybersecurity has emerged as an essential concept in everyday life. Cybersecurity awareness (CSA) is a key defence in the protection of people and systems. The research presented in this article aimed to assess the levels of CSA...
Article
Full-text available
Cybersecurity concerns are present in all nations, but the exact nature of the threats differs depending on the country and/or region. Therefore there is a need to assess the threats and impacts for specific countries. This article presents a high-level analysis of “newsworthy” cyber-incidents that affected South Africa. The 54 incidents that are c...
Chapter
In October 2015 a series of protests at South African universities against proposed fee increases escalated into a nation-wide protest with marches globally in support. Twitter proved to be a major communication and information sharing tool during these protests. The protests provided a platform to investigate the use of social media during a polit...
Chapter
For many countries the physical transport infrastructure is critical to the economy,with ports forming a gateway for the majority of trade, and rail and road used todistribute goods. Airlines are crucial to the tourism industry. Whilst the focus ofcyber-defense is on financial networks and the power grid, recent incidents illustratethat the transpo...
Article
Full-text available
Information security management programs are becoming increasingly important in enabling organizations to promote a high level of accountability and good governance. Organizations need accurate and relevant real-time information to make effective and efficient decisions pertaining to cyber threats and attacks. Based on a qualitative study, this art...
Chapter
With the continuing evolution of cyber threats, it is only a matter of time before an organisation will suffer a major breach or there is an incident of national significance. This necessitates monitoring to detect possible incidents and mechanisms to respond and recover from breaches. This chapter provides an overview of structures to aid in threa...
Presentation
Full-text available
Describing the concepts and application of cyber intelligence and counterintelligence
Article
Full-text available
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies o...
Conference Paper
Cyber-attacks have become an increasingly prevalent component in conflict and competition in national and international affairs. Many conceptual frameworks describing cyber-warfare are based on the Cold-War era concept of strategic deterrence. These strategies assume symmetry amongst the actors in a cyber-based conflict, and therefore have limitati...
Conference Paper
Full-text available
Universities around the world have invested heavily in technology which accommodates the digital-age students, and supports their learning experience. Durban University of Technology (DUT) followed the same trend, aligning their strategic planning to revive e-learning by improving pedagogical plans. This exploratory study examined the extent to whi...
Conference Paper
Full-text available
The latest arms race can be considered to be information-based, revolving around both cyber-attacks and the ability to influence mass audiences. Unlike previous arms races, any nation, non-state group or other organisation can participate. It can be attributed to the rise of the concepts of information warfare and information operations. As with an...
Article
Full-text available
Background: Contemporary technology and its rapid rise to a ubiquitous nature are affecting the way in which technology is used. This holds implications for military information operations and information warfare concepts as the previously separate functional areas are increasingly overlapping due to the increased convergence of information technol...
Article
In: Journal of Information Warfare
Chapter
In November 2013 a series of protests in the Ukraine resulted in a change of government, which was followed by a pro-Russian incursion of Crimea in 2014 and an attempted breakaway by Eastern Ukraine. During this crisis information warfare tactics were used extensively, from propaganda and misinformation to cyber-attacks. The chapter discusses these...
Conference Paper
Full-text available
Quantum cryptography, or more accurately Quantum Key Distribution (QKD), provides a secure mechanism to exchange encryption keys which can detect potential eavesdroppers. However, this is a relatively new technology in terms of implementation, and there are some concerns over possible attacks. This paper describes QKD and provides an overview of th...
Conference Paper
Full-text available
This study investigates students, or 'Emerging Adults', in the South African tertiary environment; and their risk-taking attitudes towards Facebook. The general risk attitude and behaviour of students has been researched from various angles and even in online and social environments as well. This study however focuses on Facebook due to its popular...
Conference Paper
In this paper the suitability of cloud-based security services (SECaaS) for critical information infrastructure protection (CIIP) is discussed. A background of cloud-based security services is provided. The suitability of these services for CIIP is discussed, and it is concluded that a mixed cloud and traditional solution is best. A model for provi...
Article
Full-text available
For a long time, the African continent was regarded as the ‘Dark Continent’. The rapid assimilation of information technologies into the African economies has placed Africa firmly on a trajectory that will see it compete and integrate with the developed world. As nations and organisations become more information-centric, it is natural that conflict...
Article
Full-text available
Social media is an integral part of the Web's evolution; it has become a nearly ubiquitous technology that can be accessed from traditional desktop computers and many mobile devices. The role of social media in shaping national and global political landscapes came to the fore in the aftermath of the Iranian elections in 2009, and then in the popula...
Chapter
The South African Structure of Information Warfare A South African Perspective on Cyber-Warfare The Southern African Cyber-Environment Legislation Cyber-Security and Information Warfare Organizations in South Africa Estimated Cyber-Warfare Capability in Africa Conclusion Bibliography
Article
Full-text available
This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied to critical infrastruct...
Conference Paper
Full-text available
Web 2.0 is an emerging and disruptive technology that revolves around collaboration and information sharing. This has serious implications for enterprise and organisational security. Incidents have also shown that national security may be impacted through the use of Web 2.0 tools. The paper will focus on the application of Web 2.0 tools for informa...
Article
Full-text available
Information warfare (IW) is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are...
Article
Full-text available
In January 2011, the Tunisian government stepped down after weeks of protests; this was followed by unrest and protests in Egypt against the Egyptian government, leading also to the resignation of its president. Demonstrations in both countries were facilitated in some part by the online social media and related information and communications techn...
Conference Paper
Full-text available
With the increasing prevalence of mobile devices, there is an increasing risk that the mobile networks may be targeted by information warfare attacks. An investigation of mobile security issues from an information warfare perspective, with emphasis on computer network warfare and electronic warfare, is presented. The paper focuses on analysing prio...
Conference Paper
Information operations is a relatively new concept, however it comprises of a number old principles and practices that have been used in politics, military circles and the corporate world for many years, such as information security, deception, marketing and propaganda. With the rapid progress in information and communications technologies these pr...
Conference Paper
The prominence of the media has been rapidly increasing over the last few decades, particularly the television 24-hour news media. This media uses a form of symbolism - visual aids - to enhance their reports, and with the advancement of the communications technologies, have the ability to bring near real-time "Breaking News." As the public is very...
Conference Paper
The paper presents an overview of CDMA multiuser detection systems, with primary focus on the blind adaptive detector. Error coding, as applied to CDMA systems, is discussed. Particular attention is paid to turbo coding, and the possibility of having a combined turbo decoder and CDMA detector architecture is introduced

Network

Cited By

Projects

Projects (2)
Project
Investigating cybersecurity and information warfare as it relates to international policy, diplomacy, and security.