While you’re here… help us stay here.

Are you enjoying open access to policy and research published by a broad range of organisations? Please donate today so that we can continue to provide this service.

Computer networks

NARROWER TERMS


Report

Many hands in the cookie jar

This study, conducted from March to November 2021, examines prior examples of state-sponsored cyber espionage to see what forms of response the U.S. government considered, what actions it took, and whether those actions changed adversary behaviour or affected other actors’ behaviour.
Report

The two technospheres

The divergence of the Western and Chinese technospheres is a critical driver of cybersecurity concerns requiring the attention of both governments and the private sector around the world. This report provides a set of recommendations for action to mitigate the growing cybersecurity risks posed by...
Discussion paper

Strengthening Australia’s cyber security regulations and incentives: a call for views

This discussion paper seeks the public's views about how the Australian government can encourage businesses to invest in cyber security, including through possible regulatory changes.
Policy report

Exfiltrate, encrypt, extort: the global rise of ransomware and Australia’s policy options

All governments, civil society groups and businesses—large and small—need to know how to manage and mitigate the risk of ransomware, but organisations can’t deal with the attacks on their own. This policy report addresses key areas in Australia where new policies and strategies and improved...
Policy report

An Australian strategy for the quantum revolution

The world is now at the precipice of another technological and social revolution—the quantum revolution. This report focuses on analysis, and building policy recommendations, to help Australia better leverage the quantum revolution.
Report

Somebody might hear us: emerging communications security technologies

This report outlines the principles of secure communication, and uses some examples of emerging technologies to illustrate what the next generation of secure communications might look like.
Report

Securing the subsea network: a primer for policymakers

This guide for policymakers describes subsea cables' essential functions, planning processes and common threats. It also outlines the economic and strategic interests at stake, and offers some recommendations for protecting America's centrality in subsea networks.
Report

Australia's cybersecurity future(s)

This report uses scenario analysis to examine a world where cyberspace is fragmented in the year 2024.
Guide

Australian government information security manual

These guidelines are intended for Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), cyber security professionals and information technology managers. As such, these guidelines discuss both governance and technical concepts in order to support the protection of organisations’ information and systems.
Briefing paper

Outsourcing involving cloud computing services

This resource updates information on prudential considerations and key principles issued to APRA-regulated entities in July 2015. It has been developed in response to the growing use of the cloud by APRA-regulated entities for higher inherent risk activities, and observed areas of weakness in how...
Report

Hacking for cash: is China still stealing western IP

For at least a decade and a half, Chinese hackers have conducted a widespread campaign of industrial cyber espionage, targeting private sector companies in an effort to steal intellectual property, trade secrets and other information that could help China become economically more competitive.
Report

Cybercrime legislation in the GCC countries: fit for purpose?

This paper forms part of a research project that examines cybercrime laws in the member countries of the Gulf Cooperation Council (GCC). Its aim is to assess whether these laws are fit for purpose, and to gauge their impact on the economy, security and civil...
Briefing paper

Blockchain technology

This paper discusses the new technology known as the 'blockchain'. It aims to demystify the blockchain by explaining how it works, outlining current and potential uses, as well as noting the potential risks and challenges this technology may pose to policymakers.
Policy report

Deterrence in cyberspace

Cyberattacks initiated by nation states have become the new normal, and countries including Australia have struggled with the challenge of how to respond to them. Far too often they’re considered a low priority. This paper offers a way forward, presenting a framework for deterrence -...
Report

Mitigating insider threats through personnel security

The ANAO chose to undertake this audit because effective personnel security arrangements underpin the protection of the Australian government’s people, information and assets, and the previous audit had identified deficiencies in the Australian Government Security Vetting Agency's performance.
Strategy

National security science and technology: policy and priorities

The aim of this document is to outline Australia’s current national security science and technology priorities and coordination of efforts, to best take advantage of investment in science and technology and address gaps in immediate and future national security capability.
Briefing paper

Australia's offensive cyber capability

For Australia, both defensive and offensive cyber capabilities are now an essential component of our nation’s military arsenal, and a necessary step to ensure that we keep up with global players.
Report

The digital divide: access to digital technology for people in custody

This report argues that access to digital technology for legal purposes has not kept up with changes in the community and the courts. The gap is widening, and this has the potential to cause unnecessary pressure in the justice system.
Guide

Data breach preparation and response

This guide aims to assist you in developing and implementing an effective data breach response. It outlines the requirements relating to data breaches in the Privacy Act 1988 (Cth) (Privacy Act), including personal information security requirements and the mandatory data breach reporting obligations of the...
Strategy

Secure cloud strategy

The Australian government has an ambitious agenda to transform its digital service delivery. Cloud offers reusable digital platforms at a lower cost, and shifts service delivery to a faster, more reliable digital channel. Cloud services have the opportunity to make government more responsive, convenient, available...