Information and cybersecurity

What we do

Contact information:

Dr Jabu Mtsweni
Head: CSIR Information and Cyber Security Center
@email

Tendani Malumendzha
Business Development and Commercialisation
@email

Highlights

Man pointing at item

Technology to identify unclaimed cadavers

Our fingerprint acquisition technology is used to identify cadavers in mortuaries to assist with a backlog of unidentified and unclaimed bodies. The fingerprint pattern is detected subdermally and is thus not affected by surface decomposition. Biometric sensors acquire fingerprints of cadavers and digital enquiries can be made to different databases to determine the identity of the cadaver. Piloted in Gauteng and Limpopo the system is in use in four mortuaries, in collaboration with the Gauteng Department of Health, Limpopo Department of Health, and the Forensic Pathology Services, with support from the Department of Public Service and Administration’s Centre for Public Service Innovation.

Extraction process

Improved offender recognition with new fingerprint device

The Department of Correctional Services has a new tool for offender recognition. The standalone, battery-operated device captures a fingerprint and compares it to one recorded on paper or stored in the device's memory. This allows officials to verify the fingerprints of individuals arriving at correctional facilities from court against those on the warrant of detention form. A standard digital camera captures a color image of the side of a finger showing the friction ridges, which is then converted into a conventional fingerprint using CSIR-developed software.

Our research

Cybersecurity systems

Cybersecurity systems

Go somewhere

Our team of engineers, software developers, cybersecurity specialists and researchers lead through cutting-edge research and development of home-grown cybersecurity systems, services and cybercrime-fighting capabilities, built on our extensive experience and strengthened through partnerships and collaborations with private and public industry.

Governance, privacy and trust

Governance, privacy and trust

Go somewhere

With the ultimate aim of protecting individuals and institutions from cyber risks, we help align security, privacy and trust with business objectives while ensuring regulatory compliance and effective cyber risks management. Our specialised services include policy development, security assessments, security and privacy awareness training and the implementation of privacy- and trust-enhancing technologies. We have developed and piloted a POPIA Compliance Assessment Toolkit (PCAT) that can be used by all types of entities to systematically assess their compliance to the Protection of Personal Information Act as overseen by the Information Regulator.

Data security and analytics

Data security and analytics

Go somewhere

Our hub of data-driven research and development in information and cyber security equips us to prevent, detect and respond to cyber-attacks. We develop technology demonstrators and proofs of concept for threat monitoring, threat intelligence platforms and digital forensics to assist clients with incident monitoring, response and management technologies, disaster recovery and business continuity.

 Secure identity systems

Secure identity systems

Go somewhere

We undertake research and development in identity management. We develop technologies used to authorise a myriad of socioeconomic transactions and authenticate individuals’ identities throughout their lifespan. We contribute to the ongoing development of self-sovereign identity in the country to improve service delivery, reduce fraud and corruption and enhance resource utilisation.

Resources
 

A wide-area surveillance system that detects and classifies moving... CSIR Information and Cybersecurity Centre: A brochure Go somewhere
A camera to detect gunshots and gun-related crime. Biometric recognition of minors: A brochure Go somewhere
A manual turret: Gunner protection for personnel carriers. Multimodal biometrics: A brochure Go somewhere
A manual turret: Gunner protection for personnel carriers. VeristicPrint Visitor Identification System: A brochure Go somewhere