Cyber intelligence (Computer security)

Briefing paper

04 May 2017

Sharing information on the cyber landscape is a necessary and efficient way to benefit from mutual exposure to cyber threats and boost collective defensive capacity.

The US has been pursuing cyber information sharing since the late 1990s, when the federal government directed the creation...

Share
Geographic Coverage: 

Survey

19 Apr 2017

The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.

This report should be viewed as a companion to the ACSC...

Share
APO Collection(s): 
Geographic Coverage: 

Research report

10 Mar 2017

Zero-day vulnerabilities — software vulnerabilities for which no patch or fix has been publicly released — and their exploits are useful in cyber operations — whether by criminals, militaries, or governments — as well as in defensive and academic settings.

This report provides findings...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Commentary

Article

06 Feb 2017

In the recent past phishing was an attempt to reveal personal information; passwords; bank and credit card numbers, usually within spam email that purports to be from a well-known legitimate enterprise. Phishing is rapidly evolving from attempting to just steal information to also be the vector...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Research report

06 Jan 2017

On December 9, 2016, President Barack Obama directed the Intelligence Community to conduct a full review and produce a comprehensive intelligence report assessing Russian activities and intentions in recent U.S. elections.  We have completed this report and briefed President Obama as well as...

Share
Geographic Coverage: 

Research report

04 Jan 2017

CSIS began work in late 2014 with leading experts to develop recommendations on cybersecurity for the next presidential administration.  The CSIS Cyber Policy Task Force divided its work among two groups, one in Washington D.C. and the other in Silicon Valley.   Each group brought a unique and...

Share
Broad Subject Area(s): 

Technical report

29 Dec 2016

The F.B.I. and Department of Homeland Security have released this report which details the ways that Russia acted to influence the American election through cyberespionage.

Share
Geographic Coverage: 
Broad Subject Area(s): 

Guide

15 Dec 2016

In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Research report

05 Dec 2016

The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale.

In a...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Video interview

28 Nov 2016

With the recent tabling of the Senate Economics report on the eCensus shutdown, the Prime Minister's Cyber Security adviser, Alastair MacGibbon discusses the key lessons learnt, reinforcing the government's continuing pursuit of digitalisation, but warned that relying on formal compliance...

Share
APO Collection(s): 
Geographic Coverage: 
Broad Subject Area(s): 

Research report

16 Nov 2016

Identity crime provides a foundation for many other forms of serious crime. Fraudulent identities may be used for money laundering, tax evasion, dealing in stolen motor vehicles, or to protect the true identities of organised crime members.

In addition to facilitating the commission of...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Research report

09 Nov 2016

Overview

Passenger train services for the Victorian public are an essential service, much like electricity, water, gas and port services. Train services rely on a range of systems and equipment, including control systems that monitor and control service delivery.

...

Share
Geographic Coverage: 

Blog post

15 Sep 2016

Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The hackers, suspected to be agents of a foreign state, targeted voter...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Discussion paper

14 Sep 2016

Cooperative Intelligent Transport Systems (C-ITS) enable real-time wireless communication between vehicles, roadside infrastructure, mobile devices and back-office systems. They have been developed as a way to deliver a safer and more efficient transport network that is less congested and more...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Commentary

Article

10 Aug 2016

Many Australians were unable to complete the Census on August 9 due to the Census website failing.

The Australian Bureau of Statistics (ABS) chief statistician has blamed a deliberate ‘denial of service attack’ for the failure.

Like many government information systems, the Census...

Share
APO Collection(s): 
Geographic Coverage: 
Broad Subject Area(s): 

Audio interview

Audio program

10 Aug 2016

Last night, the national census ended in disaster, after the Australian Bureau of Statistics website crashed, leaving millions of frustrated people unable to lodge their census forms.

The bureau's chief statistician, David Kalisch, says the site was taken down after four separate cyber...

Share
Geographic Coverage: 
Broad Subject Area(s): 

Manifesto

20 Jun 2016

The Australian Computer Society, – the professional association for Australia’s ICT sector – has released its Federal Election Manifesto, identifying five key policy areas that must be addressed if Australia is to secure its economic future in the information age.

1. Digital...

Commentary

Article

24 May 2016

The Australian Federal election is likely to be dominated, understandably, by economic and social issues. But Australia’s security and foreign policy environment is marked by rapid change and complex uncertainty.

From terrorism to resource insecurity, from the assertive rise of China to...

Share
APO Collection(s): 
Geographic Coverage: 
Broad Subject Area(s): 

Research report

18 May 2016

In GAO's survey of 24 federal agencies, the 18 agencies having high-impact systems identified cyber attacks from “nations” as the most serious and most frequently-occurring threat to the security of their systems. These agencies also noted that attacks delivered through e-mail were the most...

Share
APO Collection(s): 
Geographic Coverage: 
Broad Subject Area(s): 

Research report

05 May 2016

In June 2014, the Australian National Audit Office tabled in Parliament ANAO Audit Report No.50 2013–14, Cyber Attacks: Securing Agencies’ ICT Systems. The report examined implementation of the mandatory strategies in the Australian Government Information Security Manual...

Share
APO Collection(s): 
Geographic Coverage: 
Broad Subject Area(s):