Computer networks

Research report

4 Jul 2018

This paper forms part of a research project that examines cybercrime laws in the member countries of the Gulf Cooperation Council (GCC). Its aim is to assess whether these laws are fit for purpose, and to gauge their impact on the economy, security and civil...

Briefing paper

5 Jun 2018

This paper discusses the new technology known as the 'blockchain'. It aims to demystify the blockchain by explaining how it works, outlining current and potential uses, as well as noting the potential risks and challenges this technology may pose to policymakers.

Policy report

Spare the costs, spoil the bad state actor: deterrence in cyberspace requires consequences
1 Jun 2018

Cyberattacks initiated by nation states have become the new normal, and countries including Australia have struggled with the challenge of how to respond to them. Far too often they’re considered a low priority. This paper offers a way forward, presenting a framework for deterrence -...

Report

11 May 2018

The ANAO chose to undertake this audit because effective personnel security arrangements underpin the protection of the Australian government’s people, information and assets, and the previous audit had identified deficiencies in the Australian Government Security Vetting Agency's performance.

Strategy

1 May 2018

The aim of this document is to outline Australia’s current national security science and technology priorities and coordination of efforts, to best take advantage of investment in science and technology and address gaps in immediate and future national security capability.

Briefing paper

10 Apr 2018

For Australia, both defensive and offensive cyber capabilities are now an essential component of our nation’s military arsenal, and a necessary step to ensure that we keep up with global players.

Report

27 Mar 2018

This report argues that access to digital technology for legal purposes has not kept up with changes in the community and the courts. The gap is widening, and this has the potential to cause unnecessary pressure in the justice system.

Guide

A guide to managing data breaches in accordance with the Privacy Act 1988 (Cth)
19 Feb 2018

This guide aims to assist you in developing and implementing an effective data breach response. It outlines the requirements relating to data breaches in the Privacy Act 1988 (Cth) (Privacy Act), including personal information security requirements and the mandatory data breach reporting obligations of the...

Survey

6 Feb 2018

This survey of 385 not for profit organisations identified a significant under-investment in IT, with many organisations using systems that aren’t working well enough to provide efficient services.

Strategy

1 Feb 2018

The Australian government has an ambitious agenda to transform its digital service delivery. Cloud offers reusable digital platforms at a lower cost, and shifts service delivery to a faster, more reliable digital channel. Cloud services have the opportunity to make government more responsive, convenient, available...

Report

12 Dec 2017

This report assesses the national approach of Asia–Pacific countries to the challenges and opportunities of cyberspace, taking a holistic approach that assesses governance and legislation, law enforcement, military capacity and policy involvement, and business and social engagement in cyber policy and security issues.

Report

Version 2 - for public discussion
11 Dec 2017

The mission of The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems is to ensure every stakeholder involved in the design and development of autonomous and intelligent systems is educated, trained, and empowered to prioritize ethical considerations so that these technologies are advanced...

Research report

10 Nov 2017

In 2017, the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) teamed up for the second year in a row to look at the lives and experiences of cybersecurity professionals. This year’s report is based on data from a survey of 343...

Commentary

7 Nov 2017

The Panama Papers looked like the culmination of a new era for leakers — and then the Paradise Papers came along. But can we expect action to follow?

Report

10 Oct 2017

The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.

Strategy

4 Oct 2017

This resource outlines Australia's cyber affairs agenda for the next three years, with the hope of creating the environment for digital trade to generate economic growth and opportunities for Australia.

Literature review

22 Aug 2017

This report examines the existing limited research on women in the cyber security industry, and women in science, technology, mathematics, and engineering (STEM) and information and communication technology (ICT) to identify barriers to women’s labour market participation.

Briefing paper

4 May 2017

This paper offers recommendations for the development of Australia’s national cyber information sharing system.

Survey

19 Apr 2017

The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.

This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...

Journal article

16 Mar 2017

This article argues that the Australian Depertment o Defence needs to urgently conduct operationally-focused cyber-survivability trials that leverage its alliance with the United States.

Overview

 

Items: 59