You are here

FAST Record ID: 
1893401

Search Collection:

Cyber intelligence (Computer security)

Strategy

04 Oct 2017

Australia's international cyber engagement champions an open, free and secure cyberspace. Through comprehensive and coordinated engagement on cyber affairs, we will maximise opportunities for economic growth and prosperity through digital trade. Australia will cooperate internationally to reduce...

Report

07 Sep 2017

The articles reprinted in this report give a range of perspectives on the recent Australian Intelligence Community (AIC) review and its recommendations.

The articles in this report suggest that changes recommended by the review would change the...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Discussion paper

24 Aug 2017

The cyber security skills crisis is a key policy issue in many countries, and governments look in part to universities to address it. This paper addresses one narrow question to see how it speaks to the broader challenges: are current Master of Cyber Security programs in Australia preparing...

Share
APO Collection(s): 
Geographic Coverage: 
Broad Subject Area(s): 

Literature review

22 Aug 2017

The Department of Prime Minister and Cabinet (PM&C) has conducted exploratory research into women’s low representation in the cyber security industry, and found that marketing, role models, and hiring practices are barriers to attracting women into the industry. Further, these initial...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Report

03 Aug 2017

This report provides a high-level analysis of how big data capabilities can be used and managed by Australia’s national security community.

The associated resource, ‘Big Data in National Security - online resource’, provides policy makers and the public with a detailed...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Briefing paper

04 May 2017

Sharing information on the cyber landscape is a necessary and efficient way to benefit from mutual exposure to cyber threats and boost collective defensive capacity.

The US has been pursuing cyber information sharing since the late 1990s, when the federal government directed the creation...

Share
Geographic Coverage: 

Survey

19 Apr 2017

The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.

This report should be viewed as a companion to the ACSC...

Share
APO Collection(s): 
Geographic Coverage: 

Journal article

16 Mar 2017

The cyber threat to Australia’s Department of Defense (DoD) is not only information security, but includes preventing its platforms from being crippled. This threat is increasing and Australia is not keeping pace with its allies. Since 2009, the United States has used test and evaluation (T&...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Research report

10 Mar 2017

Zero-day vulnerabilities — software vulnerabilities for which no patch or fix has been publicly released — and their exploits are useful in cyber operations — whether by criminals, militaries, or governments — as well as in defensive and academic settings.

This report provides findings...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Commentary

Article

06 Feb 2017

In the recent past phishing was an attempt to reveal personal information; passwords; bank and credit card numbers, usually within spam email that purports to be from a well-known legitimate enterprise. Phishing is rapidly evolving from attempting to just steal information to also be the vector...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Research report

06 Jan 2017

On December 9, 2016, President Barack Obama directed the Intelligence Community to conduct a full review and produce a comprehensive intelligence report assessing Russian activities and intentions in recent U.S. elections.  We have completed this report and briefed President Obama as well as...

Share
Geographic Coverage: 

Research report

04 Jan 2017

CSIS began work in late 2014 with leading experts to develop recommendations on cybersecurity for the next presidential administration.  The CSIS Cyber Policy Task Force divided its work among two groups, one in Washington D.C. and the other in Silicon Valley.   Each group brought a unique and...

Share
Broad Subject Area(s): 

Technical report

29 Dec 2016

The F.B.I. and Department of Homeland Security have released this report which details the ways that Russia acted to influence the American election through cyberespionage.

Share
Geographic Coverage: 
Broad Subject Area(s): 

Guide

15 Dec 2016

In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Research report

05 Dec 2016

The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale.

In a...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Video interview

28 Nov 2016

With the recent tabling of the Senate Economics report on the eCensus shutdown, the Prime Minister's Cyber Security adviser, Alastair MacGibbon discusses the key lessons learnt, reinforcing the government's continuing pursuit of digitalisation, but warned that relying on formal compliance...

Share
APO Collection(s): 
Geographic Coverage: 
Broad Subject Area(s): 

Research report

16 Nov 2016

Identity crime provides a foundation for many other forms of serious crime. Fraudulent identities may be used for money laundering, tax evasion, dealing in stolen motor vehicles, or to protect the true identities of organised crime members.

In addition to facilitating the commission of...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Research report

09 Nov 2016

Overview

Passenger train services for the Victorian public are an essential service, much like electricity, water, gas and port services. Train services rely on a range of systems and equipment, including control systems that monitor and control service delivery.

...

Share
Geographic Coverage: 

Blog post

15 Sep 2016

Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The hackers, suspected to be agents of a foreign state, targeted voter...

Share
Geographic Coverage: 
Broad Subject Area(s):