<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>Masters of Computer Systems Management</title>
<link>http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/101</link>
<description/>
<pubDate>Mon, 13 Apr 2026 11:51:07 GMT</pubDate>
<dc:date>2026-04-13T11:51:07Z</dc:date>
<item>
<title>Data Centric Protection against Ransomware Attacks at the Office of the Auditor General</title>
<link>http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/118</link>
<description>Data Centric Protection against Ransomware Attacks at the Office of the Auditor General
Dingalo, Olebile
In attempting to answer the question of whether the Office of the Auditor General is doing enough to protect the sensitive data in its possession, I start off by stating the current information security trends. The trends highlight an upward rise in data breaches despite the numerous traditional approaches to secure data and network resources like firewalls, antiviruses, anti-malware gateways etc. In validation a study is performed at the Office of the Auditor General. Analysis of the survey data brings to light the current state of affairs that exhibits a random or ad-hoc approach to information security. It also reveals that traditional defences can be useful in protecting information assets against ransomware despite their shortcomings. The weaknesses of such methods is discussed thus emphasising the need for new innovative approaches to data security&#13;
An unconventional approach is gradually gaining popularity as an alternative. This approach is known as Data Centric Security.  It is a structured approach to enacting security by emphasising data protection as the ultimate objective. Consequently that entails being knowledgeable at all times of your data, how it is transmitted, the destination of that data, and securing it throughout its different forms/states and locations. &#13;
Lastly this approach is advanced as an additional control to augment the traditional defences. It is advocated that such approach will give relative assurance that most (if not all) attack vectors are covered when instituting defences.
</description>
<pubDate>Mon, 01 Jan 2018 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/118</guid>
<dc:date>2018-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Network Downtime in Government Department :an Investigation of this common Phenomenon with suggestion of best practices and best technologies</title>
<link>http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/117</link>
<description>Network Downtime in Government Department :an Investigation of this common Phenomenon with suggestion of best practices and best technologies
Kwelagobe, Laone
Network downtime is the period in which a computer system is unavailable or system fails to&#13;
provide/perform its primary functions. System reliability and/or availability are very Key as an&#13;
unavailable system is a failing system. It is very common is Botswana for government clients to&#13;
forfeit being serviced because the government department system is down.&#13;
The primary aim of this project was to investigate the causes of system/network downtimes in&#13;
Botswana government department. Three government departments were targeted along with&#13;
three system stakeholders who the researcher distinguished them as a technical User, a user and a&#13;
client.&#13;
The study showed the concerning results that justifies that system downtimes in government&#13;
department is very frequent and also it can take some time before downtime is resolved.&#13;
Common causes of downtime in government departments were identified and with the help of&#13;
literature the researcher recommended how the causes can be mitigated.
</description>
<pubDate>Sun, 01 Apr 2018 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/117</guid>
<dc:date>2018-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>Conceptual Framework for Multi-Factor Authentication for Mobile Money Systems in Lesotho</title>
<link>http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/116</link>
<description>Conceptual Framework for Multi-Factor Authentication for Mobile Money Systems in Lesotho
Ranyali, Ntsejoa
The widespread use of mobile phones has contributed significantly to the emergence of Mobile Money Transfer Services (MMTS) in Lesotho. This invention made a great contribution to the financial sector as it bridged the gap between those who qualify for a bank account and those who have to rely on other financial services except for bank, for their financial needs. The main objective of this research study is to enhance the security of MMTS in Lesotho, and solve its security vulnerability introduced by the current method of authentication they are using. The study proposes a conceptual framework that will mitigate these issues through Multi-factor authentication using Biometric Face Recognition (BFR) technique. BFR will eliminate the chances of a fraudster providing false information to the system, therefore improving the security of the system. The other objectives include, identifying the threats that are introduced by Personal Identification Number (PIN) as a method of authentication that is currently used by MMTS in Lesotho, and how it affects the security of their system. The other specific objective of this research is to investigate and evaluate the security issues of the MMTS in Lesotho.
</description>
<pubDate>Tue, 01 Jan 2019 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/116</guid>
<dc:date>2019-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Application of Smart Waste Management System : Case Study for Queen II Hospital, Maseru Lesotho</title>
<link>http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/115</link>
<description>Application of Smart Waste Management System : Case Study for Queen II Hospital, Maseru Lesotho
Mathe, Makamohelo Valentine
Many countries desire to have a clean and healthy environment hence the need for effective and &#13;
efficient Management of trash Bins. But for many years, the traditional way of collection and &#13;
removal of trash has not proved to be effective. There are number of problems encountered with &#13;
the usage of the traditional way of collecting trash in hospital and Healthcare Centers. These &#13;
problems include among others: trash overflow, land and air pollution and unclean and unhealthy &#13;
environment. &#13;
The main objective of these paper is to overcome all these unfavorable conditions above by &#13;
mitigate the waste that is always found scattered all over the place. The system uses Arduino to &#13;
excel communication. Smart Trash Bin (STB) is a Trash bin are interfaced with an ultrasonic&#13;
sensor which is meant to measure the distance of trash in the bin to the required level. Arduino &#13;
microcontrollers connected to ultrasonic sensor send data directly in to excel using “PLX-DAQ, a &#13;
Parallax microcontroller data acquisition add-on tool for Microsoft Excel” (Parallax Inc , 2019). &#13;
The status of the bins is monitored through Arduino to excel communication, and provides real time automated information to the control Center of the trash collection company. In addition to &#13;
this Arduino to excel communication, graphs, charts and diagrams for reports are generated &#13;
automatically to the Lesotho Millennium Development Agency and private companies that are the &#13;
hired through LMDA for record keeping and further to display and store the information meant &#13;
for additional investigations and improvements.&#13;
Collection and removal of trash is done in timely manner, truck drivers are able to have scheduled &#13;
work and planned route. This system is meant to make waste management, more efficient and &#13;
effective, less costly and it saves time. The advantage of the system to other smart waste &#13;
management’s systems is that the system uses excel to receive real-time data, there is no need for &#13;
internet usage which means extra savings. Without internet usage all problems associated with &#13;
internet usage are avoided.
</description>
<pubDate>Fri, 01 Nov 2019 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://repository.bothouniversity.ac.bw:8080/buir/handle/123456789/115</guid>
<dc:date>2019-11-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
