Cyber intelligence (Computer security)

Report

12 Dec 2017

This report assesses the national approach of Asia–Pacific countries to the challenges and opportunities of cyberspace, taking a holistic approach that assesses governance and legislation, law enforcement, military capacity and policy involvement, and business and social engagement in cyber policy and security issues.

Strategy

4 Oct 2017

This resource outlines Australia's cyber affairs agenda for the next three years, with the hope of creating the environment for digital trade to generate economic growth and opportunities for Australia.

Research report

15 Sep 2017

This paper provides an overview of the Victorian Protective Data Security Framework and its role in protecting information held by Victorian government agencies, as well as a background of the global and domestic developments in this area.

Report

7 Sep 2017

The articles reprinted in this report give a range of perspectives on the recent Australian Intelligence Community (AIC) review and its recommendations.

Discussion paper

24 Aug 2017

This paper argues that the requirement for purpose-driven and mission-specific cyber security education is increasing, and recommends that this become a focus of new initiatives in cyber security education.

Literature review

22 Aug 2017

This report examines the existing limited research on women in the cyber security industry, and women in science, technology, mathematics, and engineering (STEM) and information and communication technology (ICT) to identify barriers to women’s labour market participation.

Report

3 Aug 2017

This report provides a high-level analysis of how big data capabilities can be used and managed by Australia’s national security community.

Briefing paper

4 May 2017

Sharing information on the cyber landscape is a necessary and efficient way to benefit from mutual exposure to cyber threats and boost collective defensive capacity.

The US has been pursuing cyber information sharing since the late 1990s, when the federal government directed the creation...

Survey

19 Apr 2017

The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.

This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...

Journal article

16 Mar 2017

This article argues that the Australian Depertment o Defence needs to urgently conduct operationally-focused cyber-survivability trials that leverage its alliance with the United States.

Research report

10 Mar 2017

Zero-day vulnerabilities — software vulnerabilities for which no patch or fix has been publicly released — and their exploits are useful in cyber operations — whether by criminals, militaries, or governments — as well as in defensive and academic settings.

This report provides findings...

Commentary

Article

6 Feb 2017

In the recent past phishing was an attempt to reveal personal information; passwords; bank and credit card numbers, usually within spam email that purports to be from a well-known legitimate enterprise. Phishing is rapidly evolving from attempting to just steal information to also be the...

Research report

6 Jan 2017

On December 9, 2016, President Barack Obama directed the Intelligence Community to conduct a full review and produce a comprehensive intelligence report assessing Russian activities and intentions in recent U.S. elections. We have completed this report and briefed President Obama as well as President-elect Trump...

Research report

4 Jan 2017

CSIS began work in late 2014 with leading experts to develop recommendations on cybersecurity for the next presidential administration. The CSIS Cyber Policy Task Force divided its work among two groups, one in Washington D.C. and the other in Silicon Valley. Each group brought a...

Technical report

29 Dec 2016

The F.B.I. and Department of Homeland Security have released this report which details the ways that Russia acted to influence the American election through cyberespionage.

Guide

15 Dec 2016

In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents...

Research report

5 Dec 2016

The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale....

Video interview

28 Nov 2016

With the recent tabling of the Senate Economics report on the eCensus shutdown, the Prime Minister's Cyber Security adviser, Alastair MacGibbon discusses the key lessons learnt, reinforcing the government's continuing pursuit of digitalisation, but warned that relying on formal compliance systems could in fact be...

Research report

16 Nov 2016

Identity crime provides a foundation for many other forms of serious crime. Fraudulent identities may be used for money laundering, tax evasion, dealing in stolen motor vehicles, or to protect the true identities of organised crime members.

In addition to facilitating the commission of...

Research report

9 Nov 2016

Overview

Passenger train services for the Victorian public are an essential service, much like electricity, water, gas and port services. Train services rely on a range of systems and equipment, including control systems that monitor and control service delivery.

We reviewed the...