A mineral systems approach to the development of structural targeting criteria for orogenic gold deposits in the Asankrangwa gold belt of the Kumasi Basin, South-west Ghana
- Authors: Gelber, Benjamin D J
- Date: 2018
- Subjects: Gold ores -- Geology -- Ghana -- Kumasi , Gold mines and mining -- Ghana -- Kumasi , Asankrangwa (Ghana) , Geodynamics -- Ghana -- Kumasi , Prospecting -- Geophysical methods , Orogenic belts -- Ghana -- Kumasi
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63143 , vital:28367
- Description: The Kumasi Basin in South-west Ghana lies at the centre of the best-endowed Paleoproterozoic gold province in the world. The Kumasi Basin and margins of the adjacent volcanic belts are host to six world class gold camps: (1) 62 Moz Obuasi camp, (2) 22 Moz Prestea-Bogoso camp, (3) 11 Moz Asanko Gold Mine camp, (4) 9 Moz Edikan camp, (5) 7 Moz Bibiani camp, (6) 5 Moz Chirano camp, as well as several additional minor gold camps and many more prospects. Cumulatively these camps account for>116 Moz of endowment and contribute to making south-west Ghana the greatest Paleoproterozoic gold province in the world. Gold deposits in the Kumasi Basin are shear zone hosted and mineralisation ranges from disseminated to massive sulphide refractory deposits, to free milling quartz vein style deposits. Structural relationships and age dating indicate that most deposits are genetically related and were formed during a single episode of gold mineralisation during the D4 NNW-SSE crustal shortening deformation event of the Eburnean Orogeny (2125 – 1980 Ma). The understanding of structural controls on mineralisation is critical for exploration success as it allows exploration to focus on areas where these structural controls exist. This study uses a mineral systems approach to understand the relationship between the geodynamic history and structural controls on gold mineralisation in the Kumasi Basin at various scales, and define targeting criteria which can be applied for the purpose of developing predictive exploration models for making new discoveries in the Asanko Gold Mine camp located in the Asankrangwa Belt. The study used a quantitative analysis to establish residual endowment potential in the Asankrangwa Belt, providing the basis for a business model and resulting exploration strategy. Once established, a Fry autocorrelation analysis was applied to identify trends in deposit and camp spatial distribution to which critical geological processes were ascribed. Observed trends were mapped from multi-scale geophysical data sets and through interpretation of existing geophysical structure models, and structural criteria for targeting orogenic gold deposits at the regional and camp scales were developed. Results show that different structural controls on mineralisation act at the regional and camp scale. At the regional scale the distribution of gold camps was found to be controlled by fundamental N-S and NW-SE basement structures with gold camps forming where they intersect NE-SW first and second order structural corridors. At the Asanko Gold Mine camp scale, deposit distribution was found to be related to the intersection between major second order D3 NE-SW shear zones, minor third order D4 NNE-SSW brittle faults, and cryptic NW-SE upward propagating basement structures. In addition to these structural criteria, deposits in the Asanko Gold Mine camp were found to be aligned along a NNE-SSW lineament caused by the interaction between the N-S basement structure and the NE-SW trending Asankrangwa Belt shear corridor.
- Full Text:
- Date Issued: 2018
Evaluating the cyber security skills gap relating to penetration testing
- Authors: Beukes, Dirk Johannes
- Date: 2021
- Subjects: Computer networks -- Security measures , Computer networks -- Monitoring , Computer networks -- Management , Data protection , Information technology -- Security measures , Professionals -- Supply and demand , Electronic data personnel -- Supply and demand
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/171120 , vital:42021
- Description: Information Technology (IT) is growing rapidly and has become an integral part of daily life. It provides a boundless list of services and opportunities, generating boundless sources of information, which could be abused or exploited. Due to this growth, there are thousands of new users added to the grid using computer systems in a static and mobile environment; this fact alone creates endless volumes of data to be exploited and hardware devices to be abused by the wrong people. The growth in the IT environment adds challenges that may affect users in their personal, professional, and business lives. There are constant threats on corporate and private computer networks and computer systems. In the corporate environment companies try to eliminate the threat by testing networks making use of penetration tests and by implementing cyber awareness programs to make employees more aware of the cyber threat. Penetration tests and vulnerability assessments are undervalued; are seen as a formality and are not used to increase system security. If used regularly the computer system will be more secure and attacks minimized. With the growth in technology, industries all over the globe become fully dependent on information systems in doing their day-to-day business. As technology evolves and new technology becomes available, the bigger the risk becomes to protect against the dangers which come with this new technology. For industry to protect itself against this growth in technology, personnel with a certain skill set is needed. This is where cyber security plays a very important role in the protection of information systems to ensure the confidentiality, integrity and availability of the information system itself and the data on the system. Due to this drive to secure information systems, the need for cyber security by professionals is on the rise as well. It is estimated that there is a shortage of one million cyber security professionals globally. What is the reason for this skills shortage? Will it be possible to close this skills shortage gap? This study is about identifying the skills gap and identifying possible ways to close this skills gap. In this study, research was conducted on the cyber security international standards, cyber security training at universities and international certification focusing specifically on penetration testing, the evaluation of the need of industry while recruiting new penetration testers, finishing with suggestions on how to fill possible gaps in the skills market with a conclusion.
- Full Text:
- Date Issued: 2021