In attempting to answer the question of whether the Office of the Auditor General is doing enough to protect the sensitive data in its possession, I start off by stating the current information security trends. The trends ...
Network downtime is the period in which a computer system is unavailable or system fails to
provide/perform its primary functions. System reliability and/or availability are very Key as an
unavailable system is a failing ...
The widespread use of mobile phones has contributed significantly to the emergence of Mobile Money Transfer Services (MMTS) in Lesotho. This invention made a great contribution to the financial sector as it bridged the gap ...
Many countries desire to have a clean and healthy environment hence the need for effective and
efficient Management of trash Bins. But for many years, the traditional way of collection and
removal of trash has not ...
Cloud computing is one of latest computing paradigms where computing resources like
processors, hard-drives, data warehouses, servers, operating system and applications are rented
to the users in pay-per-use manner and ...
In recent days possible attacks on the networks has been increased and causing huge financial loss
for the various organization due to lack of proper security standards. Modern networks have
several services and zones ...
The purpose of the study was to establish the level Information Security among End User in
order to address the Human issue and its impacts on Information Security (IS) in organizations.
Human errors likely to result ...
The rapid development of Information and Communication Technology (ICT) in water sector has greatly
enhanced the management of water energy resources, water usages projections and integrates water
information asserts ...
Over the past thirty years, “Network Cyber Attacks” has been an increasing problem in
the cyber world affecting organizations and individuals – everyone in one way or the
other has been exploited. Ethical hacking and ...