Part 3: Information Security Courses and CurriculaInternational audienceIn the light of Industry 4.0, there exists a drive in engineering to include cybersecurity in the design, development and maintenance of smart cyber-physical systems. The high interconnectivity of these systems make these systems more susceptible to cyberattacks. In South Africa, the engineering education space does not traditionally cater for cybersecurity training in undergraduate or post-graduate studies. The lack of cybersecurity education in engineering and the need for cybersecurity knowledge in the industry highlights a knowledge gap in the field of cybersecurity engineering. This paper describes the process followed to determine the body of knowledge which shoul...
One of the central aspects of specialization in modern software engineering is security engineering....
In August, a Harvard Business Review article postulated that "Every Computer Science Degree Should R...
This paper presents a national case study-based analysis of the numerous dimensions to cybersecurity...
Cybersecurity is vital to most organisations, and it is important that Higher Education institutions...
With the rapid advancement of technologies in the era of Industry 4.0, the inter-connected nature of...
In the light of the expanding digitization, connectivity and interconnection of machines, products, ...
Organizations create a huge amount of sensitive and confidential data, which must be protected from ...
Part 2: Information Security Training and AwarenessInternational audienceIndustry 4.0 will impact th...
The objective of this study is to propose a cybersecurity curriculum from a best practice perspectiv...
This study examines the effect of adopting cybersecurity concepts on the information and technology ...
Part 2: WISE 7International audienceInformation Technology (IT) encompasses all aspects of computing...
The current study is an examination of integrating cybersecurity and systems engineering. The goal i...
The current study is an examination of integrating cybersecurity and systems engineering. The goal i...
The number of skilled practitioners of computer security who are able to address the complexities of...
Recently it has been noticed an increased number of cyber-incidents, sometimes causing seriously imp...
One of the central aspects of specialization in modern software engineering is security engineering....
In August, a Harvard Business Review article postulated that "Every Computer Science Degree Should R...
This paper presents a national case study-based analysis of the numerous dimensions to cybersecurity...
Cybersecurity is vital to most organisations, and it is important that Higher Education institutions...
With the rapid advancement of technologies in the era of Industry 4.0, the inter-connected nature of...
In the light of the expanding digitization, connectivity and interconnection of machines, products, ...
Organizations create a huge amount of sensitive and confidential data, which must be protected from ...
Part 2: Information Security Training and AwarenessInternational audienceIndustry 4.0 will impact th...
The objective of this study is to propose a cybersecurity curriculum from a best practice perspectiv...
This study examines the effect of adopting cybersecurity concepts on the information and technology ...
Part 2: WISE 7International audienceInformation Technology (IT) encompasses all aspects of computing...
The current study is an examination of integrating cybersecurity and systems engineering. The goal i...
The current study is an examination of integrating cybersecurity and systems engineering. The goal i...
The number of skilled practitioners of computer security who are able to address the complexities of...
Recently it has been noticed an increased number of cyber-incidents, sometimes causing seriously imp...
One of the central aspects of specialization in modern software engineering is security engineering....
In August, a Harvard Business Review article postulated that "Every Computer Science Degree Should R...
This paper presents a national case study-based analysis of the numerous dimensions to cybersecurity...