Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: March 28, 2024 Thu

Time: 9:41 am

Results for cyberterrorism

2 results found

Author: Knake, Robert K.

Title: Internet Governance in an Age of Cyber Insecurity

Summary: This report briefly examines the technological decisions that have enabled both the Internet’s spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, it outlines an agenda that the United States can pursue in concert with its allies on the international stage.

Details: Washington, DC: Council on Foreign Relations, 2010. 48p.

Source: Internet Resource: Council Special Report No. 56: Accessed September 6, 2010 at: http://www.cfr.org/publication/22832/internet_governance_in_an_age_of_cyber_insecurity.html

Year: 2010

Country: United States

URL: http://www.cfr.org/publication/22832/internet_governance_in_an_age_of_cyber_insecurity.html

Shelf Number: 119746

Keywords:
Computer Crimes
Cyber Security
Cybercrime
Cyberterrorism
Internet Crimes

Author: Blackburn, John

Title: Optimising Australia's Response to the Cyber Challenge

Summary: The Australian Government’s 2009 Cyber Security Strategy states that cyber security is one of Australia’s top-tier national security priorities. It highlights that Australia’s national security, economic prosperity and social wellbeing are critically dependent upon the availability, integrity and confidentiality of a range of information and communications technologies. There is a growing threat from state and non-state actors who compromise, steal, change or destroy information and information systems upon which societies depend. This report examines the nature of the cyber challenge confronting Australia and how such a threat can be better addressed. Australia may well have reached a “tipping point” where the current trajectory of cyber responses is being rapidly outpaced by the evolving threat. In seeking to maintain a secure, resilient and trusted electronic operating environment that supports Australia’s national security and maximises the benefits of the digital economy, the Australian Government has defined cyber security as “Measures relating to the confidentiality, availability and integrity of information that is processed, stored and communicated by electronic or similar means”. The government’s strategy is well thought out and clearly identifies key near-term initiatives that address the cyber security threat. However, the breadth, scale and growth rate of the threat are such that the current cyber security program is not keeping pace. In fact, the actions taken to date have helped highlight the scale of the problem and underscored that more needs to be done in order to address the challenge. A complicating issue is that of public awareness. A large part of the Australian population does not comprehend the scale of the growing cyber threat, nor the potential impact of that threat on personal and national wellbeing. That lack of understanding, and therefore commitment to addressing the threat, is a fundamental weakness in the individual and collective security of Australians. This report seeks to answer two fundamental questions: are we doing enough to address the growing threat to our national and individual security in the cyber environment, and if not, what do we need to do? The report concludes that whilst progress in implementing the government’s 2009 Cyber Security Strategy has been laudable, we are not keeping pace with the growing threat and as a result are placing our collective and individual security at risk. What is lacking is a whole-of-nation, government-led integrated long-term National Cyber Strategy and Plan with defined responsibilities, identified priorities and dedicated resources that recognises the scale of the cyber challenge and the need to address that challenge in a more comprehensive manner. Australia needs to further harmonise the roles and responsibilities of government, industry and the public. While there will be technical challenges in meeting the evolving threat, the greatest challenges will centre on the cultural and organisational changes that will be needed to improve Australia’s security in the cyber environment. Specific conclusions and recommendations include: • Develop a whole-of-nation, government-led integrated long-term National Cyber Strategy and Cyber Capability Plan (as a subset of the National Security Strategy) with defined responsibilities, identified priorities and dedicated resources. • Assign the lead to coordinate cyber-related security issues across government to the Office of the National Security Adviser. • Continue to build on the current cyber programs but with some process and structural change to ensure the cyber threat is understood and cyber vulnerabilities are reduced, a credible counter-attack capability is developed, continuous technology discovery is pursued, culture change is effected, and alignment with key allies is achieved. • Accelerate systemic change through a suite of proactive measures such as a proposed National Security Innovation Centre, a virtual Cyber Academy, a Cyber Test Range, and a cyber Cooperative Research Centre (CRC). This will help to normalise cyber as a part of everyday activity. A key consideration regarding any recommended actions is that of timing - the gap between threat and response capabilities is growing. In the aftermath of the global economic crisis all governments are faced with increasing financial pressures. Projected growth in public and private debt as well as social security and health costs will likely exacerbate these financial pressures in the future. If we do not increase our focus on cyberspace, the threat will grow faster than our response and the cost of addressing the growing threat gap in the future will increase, possibly exponentially. Any delay in taking action may prove unaffordable in the long-term and introduce greater risks.

Details: Kingston, ACT, AUS: Kokoda Foundation, 2011. 84p.

Source: Internet Resource: Kokoda Papers, No. 14: Accessed March 16, 2011 at: http://www.kokodafoundation.org/Resources/Documents/KP14ResponsetoCyber.pdf

Year: 2011

Country: Australia

URL: http://www.kokodafoundation.org/Resources/Documents/KP14ResponsetoCyber.pdf

Shelf Number: 121021

Keywords:
Computer Crimes
Computer Networks
Computer Security (Australia)
Cybercrime
Cyberterrorism