Cyber security

Alternate Term Label:
Computer security
Cybersecurity
Information technology security measures
Internet security
Strategy

Australia’s cyber security strategy 2020

Through this strategy, the Australian government will attempt to build trust in the online world by supporting businesses’ cyber resilience, including by sharing threat information, setting clear expectations of roles and strengthening partnerships.
Policy report

Clean pipes: should ISPs provide a more secure internet?

This paper explores the concept of ‘clean pipes’, which is the idea that internet service providers (ISPs) could provide security services to their customers to deliver a better level of default security.
Briefing paper

Standards for cybersecure IoT devices: a way forward

In the absence of broad-based regulations, setting the bar for minimum cybersecurity features for internet-of-things (IoT) devices, standards and certification represent the last line of defence to protect consumers, governments, industry and critical infrastructure from cybercriminals and state-sponsored cyberattacks. This paper calls for a new...
Guide

Guide to securing personal information

This guide provides guidance on the reasonable steps entities are required to take to protect the personal information they hold from misuse, interference, loss, and from unauthorised access, modification or disclosure.
Report

National security agencies and the cloud

This report identifies four significant obstacles that stand in the way of Australia’s national security community moving to cloud infrastructure. These obstacles need to be crossed, and the change needs to be driven by ministers and agency heads.
Report

Criteria for security and trust in telecommunications networks and services

The CSIS Working Group on Trust and Security in 5G Networks has developed this criteria for governments and network owners or operators to use in assessing the trustworthiness of telecommunications equipment suppliers.
Report

Lessons from COVID-19 for 5G and internet security

With China’s credibility damaged over the early denials of the lethality of the COVID-19 virus, can Western nations trust its official assurances on 5G neutrality? Are we prepared for the worst if the fears about 5G became a reality? Randolph Mank explores the issues in...
Report

Weaponised deep fakes: national security and democracy

A deep fake is a digital forgery created through deep learning (a subset of AI). Deep fakes can create entirely new content or manipulate existing content, including video, images, audio and text. This paper argues that policymakers face a narrowing window of opportunity to minimise...
Report

The Commonwealth cyber security posture in 2019

Identifying the cyber security posture or vulnerabilities of individual Commonwealth entities may increase their risk of being targeted by malicious cyber actors. This report, therefore, does not identify specific entities – all data has been anonymised and provided in aggregate.
Report

A matter of security, privacy and trust

The principal objective of this study is to identify the principles and values of encryption in New Zealand with a view to informing future developments of encryption-related laws and policies. The overarching question is: What are the fundamental principles and values that apply to encryption?