Protection of Australia in the Cyber Age

@article{Warren2011ProtectionOA,
  title={Protection of Australia in the Cyber Age},
  author={Matthew J. Warren and Shona Leitch},
  journal={Int. J. Cyber Warf. Terror.},
  year={2011},
  volume={1},
  pages={35-40}
}
Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the… 

An Approach to Governance of CyberSecurity in South Africa

TLDR
This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.

Development of a South African Cybersecurity Policy Implementation Framework

TLDR
This paper proposes and describes a possible cybersecurity implementation framework for South Africa, based on previous analysis of structures in other countries, a cybersecurity awareness toolkit, guidelines for cybersecurity strategies in the literature, and an implementation framework proposed for Jordan.

Cyber Security and Protection of ICS Systems: An Australian Example

TLDR
ICS systems form part of many countries’ key critical infrastructure, including Australia and are used to remotely monitor and control the delivery of essential services and products, such as electricity, gas, water, waste treatment and transport systems.

Cyber Conflict Bibliography, 2015 Update

The purpose of this bibliography, originally prepared for the Future of Cyber Warfare symposium held at The George Washington University Law School in April 2012, is to provide scholarly and other

Cyber Conflict Bibliography

The purpose of this bibliography, originally prepared for the Future of Cyber Warfare symposium held at George Washington University Law School in April 2012, is to provide scholarly and other

Cyber Security: Analytics, Technology and Automation

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.

Cyber Crime a Rising Threat for Internet-Based Businesses in Western Region, Kenya

  • Computer Science
  • 2015
TLDR
The study exposed the vulnerability of internet-based industry and recommends for a policy and regulation framework on cybercrime protection forinternet-based businesses coupled with enhanced law enforcement particularly cyber crime information sharing between enforcement agents.

References

SHOWING 1-3 OF 3 REFERENCES

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation

TLDR
This paper presents a meta-analysis of the literature on cyber-security and its applications to decision-making in the rapidly changing environment, which highlights the need to understand more fully the role and risks of cyber-attacks.

A risk analysis approach to critical information infrastructure protection

TLDR
This paper will present the methodology of the new techniques and their application to critical information infrastructure protection, and the associated advantages of this methodology will also be discussed.

Commercial Critical Systems and Critical Infrastructure Protection: A Future Research Agenda

Secure management of Australia’s commercial critical infrastructure presents ongoing challenges to owners and the government. Although it is currently managed through high-level information sharing