Computer networks

NARROWER TERMS:
Report

Australia's cybersecurity future(s)

This report uses scenario analysis to examine a world where cyberspace is fragmented in the year 2024.
Guide

Australian government information security manual

These guidelines are intended for Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), cyber security professionals and information technology managers. As such, these guidelines discuss both governance and technical concepts in order to support the protection of organisations’ information and systems.
Report

Hacking for cash: is China still stealing western IP

For at least a decade and a half, Chinese hackers have conducted a widespread campaign of industrial cyber espionage, targeting private sector companies in an effort to steal intellectual property, trade secrets and other information that could help China become economically more competitive.
Briefing paper

Outsourcing involving cloud computing services

This resource updates information on prudential considerations and key principles issued to APRA-regulated entities in July 2015. It has been developed in response to the growing use of the cloud by APRA-regulated entities for higher inherent risk activities, and observed areas of weakness in how...
Report

Cybercrime legislation in the GCC countries: fit for purpose?

This paper forms part of a research project that examines cybercrime laws in the member countries of the Gulf Cooperation Council (GCC). Its aim is to assess whether these laws are fit for purpose, and to gauge their impact on the economy, security and civil...
Report

Public networks for public safety: a workshop on the present and future of mesh networks

This briefing document was developed in conjunction with “Public Networks for Public Safety: A Workshop on the Present and Future of Mesh Networking,” which was held on March 30, 2012, at Harvard University. The workshop was intended as a starting point for conversation about whether...
Literature review

Switching on the possibilities of ICT use in alternative education programs: a literature review

The purpose of this review is to investigate the key issues surrounding young people and ICT in the context of social connectedness, engagement and education. Our review has led to an identification of gaps in knowledge and the development of research questions for further enquiry.
Briefing paper

Blockchain technology

This paper discusses the new technology known as the 'blockchain'. It aims to demystify the blockchain by explaining how it works, outlining current and potential uses, as well as noting the potential risks and challenges this technology may pose to policymakers.
Policy report

Deterrence in cyberspace

Cyberattacks initiated by nation states have become the new normal, and countries including Australia have struggled with the challenge of how to respond to them. Far too often they’re considered a low priority. This paper offers a way forward, presenting a framework for deterrence -...
Report

Mitigating insider threats through personnel security

The ANAO chose to undertake this audit because effective personnel security arrangements underpin the protection of the Australian government’s people, information and assets, and the previous audit had identified deficiencies in the Australian Government Security Vetting Agency's performance.