Cyber security

Alternate Term Label:
Computer security
Cybersecurity
Information technology security measures
Internet security
Guide

Guide to securing personal information

This guide provides guidance on the reasonable steps entities are required to take to protect the personal information they hold from misuse, interference, loss, and from unauthorised access, modification or disclosure.
Report

National security agencies and the cloud

This report identifies four significant obstacles that stand in the way of Australia’s national security community moving to cloud infrastructure. These obstacles need to be crossed, and the change needs to be driven by ministers and agency heads.
Report

Criteria for security and trust in telecommunications networks and services

The CSIS Working Group on Trust and Security in 5G Networks has developed this criteria for governments and network owners or operators to use in assessing the trustworthiness of telecommunications equipment suppliers.
Report

Lessons from COVID-19 for 5G and internet security

With China’s credibility damaged over the early denials of the lethality of the COVID-19 virus, can Western nations trust its official assurances on 5G neutrality? Are we prepared for the worst if the fears about 5G became a reality? Randolph Mank explores the issues in...
Report

Weaponised deep fakes: national security and democracy

A deep fake is a digital forgery created through deep learning (a subset of AI). Deep fakes can create entirely new content or manipulate existing content, including video, images, audio and text. This paper argues that policymakers face a narrowing window of opportunity to minimise...
Report

The Commonwealth cyber security posture in 2019

Identifying the cyber security posture or vulnerabilities of individual Commonwealth entities may increase their risk of being targeted by malicious cyber actors. This report, therefore, does not identify specific entities – all data has been anonymised and provided in aggregate.
Report

A matter of security, privacy and trust

The principal objective of this study is to identify the principles and values of encryption in New Zealand with a view to informing future developments of encryption-related laws and policies. The overarching question is: What are the fundamental principles and values that apply to encryption?
Report

Cybercrime prevention principles for internet service providers

The working group that contributed to the development of the principles outlined in this report agreed that all internet service providers (ISPs) should explore and ideally commit to implementing the recommendations on their own networks, due to the significant impact this could have on the...
Report

Surveillance on UK council websites

This report from software developer, Brave, reveals that people seeking help for addiction, disability, and poverty on council websites are profiled by private companies in the United Kingdom. None of the data collecting companies recorded in this study had received consent from the website visitor...
Report

Twin pillars: upholding national security and national innovation in emerging technologies governance

This 2019 Global Security Forum report assesses the U.S. federal government’s approach to emerging technologies governance.