Had fun contributing to the Space edition of the Careers with STEM magazine. Thank you to the team for their efforts in helping to inspire the next generation of space professionals in Australia! See the magazine and a little about what I do in Space-Cyber Security below:https://issuu.com/refractionmedia/docs/cws_space_2022/8 Also a brief article here:https://careerswithstem.com.au/profiles/dr-jordan-plotnek/
Tag Archives: cybersecurity
Security Threats to the Academic Sector in 2022
I feel for universities at this time. They’ve just come through a battering of nation-wide cyber attacks, a pandemic that threw their standard operating model out the window, and budget cuts that forced rearrangement of entire departments and projects. And now, after all this, being declared critical infrastructure late last year puts academia under theContinue reading “Security Threats to the Academic Sector in 2022”
Australian Cyber Warfare Conference 2019
The proceedings from last year’s Australian Cyber Warfare Conference have been published. If you missed my presentation on the definition and taxonomy of Cyber Terrorism you can check out the discussion paper on Page 1 of the 2019 Australian CWAR Proceedings. https://www.australian-cyberwarfare.com/past-proceedings
What is Cyber Terrorism: Discussion of Definition and Taxonomy
JJ Plotnek, J Slay (La Trobe University) This paper reviews the use of the term ‘cyber terrorism’ and proposes a new universally-applicable taxonomy and definition. The proposed new definition is derived from detailed analyses of existing definitions in the publicly available literature, which includes all of the key commonalities identified in accordance with the newlyContinue reading “What is Cyber Terrorism: Discussion of Definition and Taxonomy”
CyberCon 2019
If you’re attending the Australian Cyber Conference next week be sure to check out the embedded Australian Cyber Warfare Conference (CWAR), where Prof. Jill Slay will be presenting my paper on Cyber Terrorism.
How to achieve ‘Secure by Design’
Taking an inward vulnerability focus is the only way to secure a system by design. This ensures the most critical security consequences of system failure are covered, regardless of what happens outside the system boundary.
Cybersecurity – the foundation for success
Most people’s introduction to cybersecurity begins with a dramatic video displaying a balaclava-clad criminal hacking their way into a business and wreaking havoc from a dark room with no windows. Unfortunately, this image tends to create a fear-driven mindset that promotes counter-productive behaviours. Whilst it’s completely true that threats from cyberspace pose significant risks toContinue reading “Cybersecurity – the foundation for success”
Foiling the enemy is now a more cutting-edge job
“DART-A’s primary task while here is to give senior leaders the ability to understand and, if required,address any risks posed to air operations from the cyberspace domain.”… Continue reading
DART-A delivers cyberspace security
A HISTORIC Air Force Squadron is now at the leading edge of defending deployed units against cyberspace attacks. Originally formed in 1942 as a bomber unit, No. 462 Squadron (462SQN) now forms part of the Air Warfare Centre’s Directorate of Information Warfare. It has now returned to operations, this time sending Deployable Assessment & RemediationContinue reading “DART-A delivers cyberspace security”
Hacking and Securing Smart Cities
In the below video Cesar Cerrudo, the CTO of IOActive Labs and Board Member of Securing Smart Cities, presents his perspective of what a Smart City is before delving into some of his experiences with the security of smart technologies and describing some rather frightening attack vectors and potential scenarios. Finally, he concludes with some recommendationsContinue reading “Hacking and Securing Smart Cities”