Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Brett van Niekerk is active.

Publication


Featured researches published by Brett van Niekerk.


information security for south africa | 2010

Mobile security from an information warfare perspective

Brett van Niekerk; Manoj Maharaj

With the increasing prevalence of mobile devices, there is an increasing risk that the mobile networks may be targeted by information warfare attacks. An investigation of mobile security issues from an information warfare perspective, with emphasis on computer network warfare and electronic warfare, is presented. The paper focuses on analysing prior cases of mobile security breaches from an information warfare perspective, however previous research is also discussed. The validity of the various potential and perceived threats to mobile security is discussed. Preliminary results from current research into mobile security and information warfare are reported; initial simulation results assessing the practicality of jamming and eavesdropping on 3G signals and the responses from first round of research interviews are discussed.


Scientia Militaria: South African Journal of Military Studies | 2011

Relevance of information warfare models to critical infrastructure protection

Brett van Niekerk; Manoj Maharaj

This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied to critical infrastructures to illustrate the relevance to critical infrastructure protection. By considering the interdependencies of the critical infrastructure sectors, it will be shown how all critical infrastructures can be modelled as information infrastructures when considering information warfare attacks.


International Journal of Cyber Warfare and Terrorism (IJCWT) | 2016

Cyber-Security for ICS/SCADA: A South African Perspective

Barend Pretorius; Brett van Niekerk

Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed. KeyWoRDS Cyber-Attack, Cyber-Security, Industrial Control Systems, Supervisory Control and Data Acquisition, Vulnerabilities


Scientia Militaria: South African Journal of Military Studies | 2013

Information-based conflict in Africa

Brett van Niekerk; Manoj Maharaj

For a long time, the African continent was regarded as the ‘Dark Continent’.The rapid assimilation of information technologies into the African economies has placed Africa firmly on a trajectory that will see it compete and integrate with the developed world. As nations and organisations become more information-centric, it is natural that conflicts and competition amongst the various nations or organisations will become increasingly information-based. In this article, the authors reflect upon information-based conflict in Africa. Areas of information conflict that are discussed include censorship, communications intercepts, the use of information and communications to instigate violence and uprisings, and the possibility of cyberwarfare. The article shows that the use of technology to conduct information conflict in Africa is prevalent, and that it is likely to increase.


ist-africa week conference | 2016

Suppression of cyber-defences

Brett van Niekerk

Cyber-attacks have become an increasingly prevalent component in conflict and competition in national and international affairs. Many conceptual frameworks describing cyber-warfare are based on the Cold-War era concept of strategic deterrence. These strategies assume symmetry amongst the actors in a cyber-based conflict, and therefore have limitations when placed in a cyber-warfare context. These limitations are discussed with reference to cyber-attacks occurring subsequent to the proposal of these conceptual frameworks. This paper proposes an alternative strategy based on the concept of suppression of enemy air defence, which is a military approach based on overwhelming air superiority. By proposing this conceptual framework, the paper endeavours to fill the gap of cyber-warfare with high asymmetry between the adversaries. Defensive considerations are discussed, with particular emphasis on the South African cyber-defence environment.


information security for south africa | 2014

Suitability of quantum cryptography for national facilities

Abdul Mirza; Makhamisa Senekane; Francesco Petruccione; Brett van Niekerk

Quantum cryptography, or more accurately Quantum Key Distribution (QKD), provides a secure mechanism to exchange encryption keys which can detect potential eavesdroppers. However, this is a relatively new technology in terms of implementation, and there are some concerns over possible attacks. This paper describes QKD and provides an overview of the implementations in South Africa. From this, a basic vulnerability assessment is performed to determine the suitability of QKD for use in critical national facilities. While there are vulnerabilities, some of these can be easily mitigated through proper design and planning. The implementation of QKD as an additional layer to the encryption process may serve to improve the security between national key points.


International Journal of Communication | 2011

Analyzing the Role of ICTs in the Tunisian and Egyptian Unrest from an Information Warfare Perspective

Brett van Niekerk; Kiru Pillay; Manoj Maharaj


International Journal of Communication | 2013

Social Media and Information Conflict

Brett van Niekerk; Manoj Maharaj


SA Journal of Information Management | 2011

The Information Warfare Life Cycle Model

Brett van Niekerk; Manoj Maharaj


International Journal of Communication | 2011

The Arab Spring| Analyzing the Role of ICTs in the Tunisian and Egyptian Unrest from an Information Warfare Perspective

Brett van Niekerk; Kiru Pillay; Manoj Maharaj

Collaboration


Dive into the Brett van Niekerk's collaboration.

Top Co-Authors

Avatar

Manoj Maharaj

University of KwaZulu-Natal

View shared research outputs
Top Co-Authors

Avatar

Harold Patrick

University of KwaZulu-Natal

View shared research outputs
Top Co-Authors

Avatar

Kiru Pillay

University of KwaZulu-Natal

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ziska Fields

University of KwaZulu-Natal

View shared research outputs
Top Co-Authors

Avatar

Pierre Jacobs

Council for Scientific and Industrial Research

View shared research outputs
Top Co-Authors

Avatar

Abdul Mirza

University of KwaZulu-Natal

View shared research outputs
Top Co-Authors

Avatar

Barend Pretorius

University of KwaZulu-Natal

View shared research outputs
Top Co-Authors

Avatar

Craig Blewett

University of KwaZulu-Natal

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge