The proceedings from last year’s Australian Cyber Warfare Conference have been published. If you missed my presentation on the definition and taxonomy of Cyber Terrorism you can check out the discussion paper on Page 1 of the 2019 Australian CWAR Proceedings. https://www.australian-cyberwarfare.com/past-proceedings
JJ Plotnek, J Slay (La Trobe University) This paper reviews the use of the term ‘cyber terrorism’ and proposes a new universally-applicable taxonomy and definition. The proposed new definition is derived from detailed analyses of existing definitions in the publicly available literature, which includes all of the key commonalities identified in accordance with the newlyContinue reading “What is Cyber Terrorism: Discussion of Definition and Taxonomy”
If you’re attending the Australian Cyber Conference next week be sure to check out the embedded Australian Cyber Warfare Conference (CWAR), where Prof. Jill Slay will be presenting my paper on Cyber Terrorism.
Taking an inward vulnerability focus is the only way to secure a system by design. This ensures the most critical security consequences of system failure are covered, regardless of what happens outside the system boundary.
Most people’s introduction to cybersecurity begins with a dramatic video displaying a balaclava-clad criminal hacking their way into a business and wreaking havoc from a dark room with no windows. Unfortunately, this image tends to create a fear-driven mindset that promotes counter-productive behaviours. Whilst it’s completely true that threats from cyberspace pose significant risks toContinue reading “Cybersecurity – the foundation for success”
“DART-A’s primary task while here is to give senior leaders the ability to understand and, if required,address any risks posed to air operations from the cyberspace domain.”… Continue reading
A HISTORIC Air Force Squadron is now at the leading edge of defending deployed units against cyberspace attacks. Originally formed in 1942 as a bomber unit, No. 462 Squadron (462SQN) now forms part of the Air Warfare Centre’s Directorate of Information Warfare. It has now returned to operations, this time sending Deployable Assessment & RemediationContinue reading “DART-A delivers cyberspace security”
In the below video Cesar Cerrudo, the CTO of IOActive Labs and Board Member of Securing Smart Cities, presents his perspective of what a Smart City is before delving into some of his experiences with the security of smart technologies and describing some rather frightening attack vectors and potential scenarios. Finally, he concludes with some recommendationsContinue reading “Hacking and Securing Smart Cities”
Privacy has been a hot topic of debate in recent times. In light of controversial events such as the ‘leaking’ of celebrity nudes and Edward Snowden’s NSA revelations, a lot people have become much more aware of the implications technology presents to the security of their personal information. Hence it is quite understandable that some people are legitimately scared of this prospectContinue reading “Are Smart Cities Invading Our Privacy?”