JJ Plotnek, J Slay (La Trobe University) This paper reviews the use of the term ‘cyber terrorism’ and proposes a new universally-applicable taxonomy and definition. The proposed new definition is derived from detailed analyses of existing definitions in the publicly available literature, which includes all of the key commonalities identified in accordance with the newly … Continue reading What is Cyber Terrorism: Discussion of Definition and Taxonomy
If you're attending the Australian Cyber Conference next week be sure to check out the embedded Australian Cyber Warfare Conference (CWAR), where Prof. Jill Slay will be presenting my paper on Cyber Terrorism.
Taking an inward vulnerability focus is the only way to secure a system by design. This ensures the most critical security consequences of system failure are covered, regardless of what happens outside the system boundary.
Most people’s introduction to cybersecurity begins with a dramatic video displaying a balaclava-clad criminal hacking their way into a business and wreaking havoc from a dark room with no windows. Unfortunately, this image tends to create a fear-driven mindset that promotes counter-productive behaviours. Whilst it’s completely true that threats from cyberspace pose significant risks to … Continue reading Cybersecurity – the foundation for success
“DART-A’s primary task while here is to give senior leaders the ability to understand and, if required,address any risks posed to air operations from the cyberspace domain.”... Continue reading
A HISTORIC Air Force Squadron is now at the leading edge of defending deployed units against cyberspace attacks. Originally formed in 1942 as a bomber unit, No. 462 Squadron (462SQN) now forms part of the Air Warfare Centre’s Directorate of Information Warfare. It has now returned to operations, this time sending Deployable Assessment & Remediation … Continue reading DART-A delivers cyberspace security
In the below video Cesar Cerrudo, the CTO of IOActive Labs and Board Member of Securing Smart Cities, presents his perspective of what a Smart City is before delving into some of his experiences with the security of smart technologies and describing some rather frightening attack vectors and potential scenarios. Finally, he concludes with some recommendations … Continue reading Hacking and Securing Smart Cities