Cyberspace

Report

18 Apr 2019
88

By mapping the global expansion of 12 of China’s largest and most influential technology companies across a range of sectors, this project contributes new data and analysis to help consider the geostrategic, political and human rights implications of China's technological expansion.

Report

29 Jan 2019
18

As cyber threats continue to grow in sophistication, organizations face a persistent challenge in recruiting skilled cybersecurity professionals. This paper highlights the gaps that exist in the nation’s current cybersecurity education and training landscape and identifies examples of successful programs that hold promise as models...

Strategy

21 Sep 2018
168

This document outlines the steps the U.S government is taking to advance an open, secure, interoperable and reliable cyberspace. Given the interconnected and global nature of cyberspace, the State Department engages in key diplomatic and programmatic initiatives to support many key objectives reflected in this...

Report

10 Oct 2017
383

The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.

Briefing paper

8 Aug 2017
321

An interdisciplinary exercise generated three overarching policy recommendations to improve cyber security in Australia: create and enforce technology security standards, craft international agreements to address cyber security challenges, and improve risk awareness to keep users safe online.

Report

17 Mar 2017
63

The inaugural Australia–US Cyber Security Dialogue held in Washington DC in September 2016 examined cybersecurity issues and how best to manage them in a cooperative manner.

The dialogue was facilitated by ASPI and the Center for Strategic and International Studies (CSIS).

The robust...

Report

1 Mar 2017
4

Japan’s cyberdefenses remain underdeveloped compared to the country’s great reliance on information and communications technology. Despite Japan’s initial slow response to the security challenges emerging from cyberspace, this paper posits that cybersecurity under the administration of Japanese Prime Minister Shinzo Abe has moved to the...

Commentary

Article

6 Feb 2017
158

Introduction

When the Australian Signals Directorate (ASD) released its Top Four Strategies to Mitigate Targeted Cyber Intrusions in 2011, it was revolutionary, because it cut to the chase. Do these four things first, before anything else, and you'll repel 85 percent of targeted...

Report

23 Nov 2016
38

Overview

Across the world, there are conflicting ideas about how to manage the dynamic environment of cyberspace. States have the liberty of implementing legislation for the domestic regulation of cyberspace, but disagreements arise over national visions for the management of cyberspace internationally. Many...

Report

3 Nov 2016
84

Overview

The global economy is a complex cyber ecosystem. The movement of goods and services across cities, nations and the world assumes secure and assured access to the internet. Many processes are becoming automated and all manner of devices are being connected to...

Report

2 Nov 2016
97

Overview

The governance of cyber security has become a pressing challenge to both the public and private sector. Currently, cyber crime is the second most-reported economic crime, affecting 32 per cent of organisations, at a cost to the Australian economy that is estimated...

Report

12 Oct 2016
211

The Australian Cyber Security Centre (ACSC) Threat Report continues to reflect the experience, focus, and mandates of the ACSC's member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new...

Guide

2 Aug 2016
114

Introduction

Socially-engineered emails containing malicious attachments and embedded links have been observed by the Australian Signals Directorate (ASD) being used in targeted cyber intrusions against organisations.

This document has been developed by ASD in collaboration with local and international partners to provide...

Report

27 Jul 2016
67

Overview

In a society that’s now reliant on cyberspace for everyday life, and when everything from cars, electricity grids and dams to weapons systems is connected to a network, the potential effects of malicious or aggressive actions in cyberspace warrant some justified concern....

Report

31 May 2016
67

Overview

A serious approach to military modernisation requires countries to equip, train, and organise cyberforces for what has become an essential component of national defence and deterrence. A force without adequate cyber capabilities is more dangerous to itself than to its opponents. As...

Article

27 Apr 2016
49

This article is an opinion piece published by The Interpereter - Lowy Institute for International Policy. It was written shortly after the Australia's new cyber security policy was released in April 2016. The piece discusses the disadvantage of having the strategy's deliverables portioned into six...

Video

22 Feb 2016
74

In the week of 15-19 February, the National Security College hosted a major cybersecurity conference – Securing our Future in Cyberspace – bringing together our international research program partners from the United States, United Kingdom and Canada.

To launch the conference, on 15 February...

Report

26 Oct 2015
125

Provides a depth of information and analysis that builds a deeper understanding of regional countries’ whole of nation approach to cyber policy, crime, and security issues, and identifies potential opportunities for engagement.

Summary The second edition of the International Cyber Policy Centre’s annual...

Report

29 Jul 2015
258

The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for malicious activities even if they do not think the information held...

Data portal

20 May 2015
117

The cybercrime repository is a central data repository of cybercrime laws and lessons learned for the purposes of facilitating the continued assessment of needs and criminal justice capabilities and the delivery and coordination of technical assistance.

During a side event at the 24th Commission...

Overview

 

Items: 27