The Proceedings of the 13 th Australian Information Warfare
نویسندگان
چکیده
Traditional approaches to tactical Computer Network Defence (CND), drawn from the lessons and doctrine of conventional warfare, are based on a team of deployed security professionals countering the adversary’s cyber forces. The concept of the adversary in cyberspace does not fit neatly into the conventional military paradigms. Rather than fighting an identifiable foe, cyber adversaries are clandestine, indistinguishable from legitimate users or external services, operate across state boundaries, and from safe havens that provide sanctuary from prosecution. The defender also faces imbalances with rules of engagement and a severe disparity between the cost of delivering the defence and the attackers ability to deliver an effect. These operational conditions are more akin with Irregular Warfare (IW) than a conventional conflict. This paper proposes a new approach to CND, based on a review of the literature on IW. Rather than fight the battle alone, the CND team should concentrate efforts to persuade and empower network users to take responsibility for protecting the organisation’s critical data. This approach seeks to apply the lessons learnt from IW, where the resistance to the adoption of security best practices, intentional or otherwise, is the real adversary. This approach appears more likely to deliver long term protection from the current cyber threats than a process, which requires the identification and tracking of adversaries that are invisible and constantly changing.
منابع مشابه
Proceedings of the 7 th Australian Information Security Management
The status of information security in Australian medical general practice is discussed together with a review of the challenges facing small practices that often lack the technical knowledge and skill to secure patient information by themselves. It is proposed that an information security governance framework is required to assist practices in identifying weaknesses and gaps and then to plan an...
متن کاملThe Challenges of E- Proceedings in Iran
With the development of information and communication technology, the need for the plaintiffs and the use of paper has decreased in the process of proceedings, but this type of trial has many legal and executive challenges. The present research in purpose view, applied and in terms of methodology is descriptive-analytic which seeks to analyze the legal and enforcement challenges of electronic j...
متن کاملارزیابی الگوی پراکنش مکانی گونههای درختی و درختچهای در جنگلهای زاگرس مرکزی (پژوهش موردی: ذخیرهگاه جنگلی چهارطاق)
موقعیت مکانی و اندازه ارتفاع و تاج تمام درختان و درختچههای متعلق به پنج گونه ارس، برودار، زبانگنجشک، کیکم و زالزالک روییده در کنار یکدیگر در وسعتی برابر 53 هکتار از ذخیرهگاه جنگلی چهارطاق در زاگرس مرکزی اندازهگیری شدند. الگوهای پراکنش پایههای هر گونه توسط چهار شاخص C، هینز، ابرهارت، پیلو و جانسون- زیمر محاسبه شدند. در کنار این شاخصها، تخمین بصری و شاخص رشد آزاد (نسبت اندازه مساحت تاج به ...
متن کاملRemote Hospital Reform in the Context of Australian Health Care Reforms
Public hospitals play an important role in the delivery of essential healthcare in Australia as in many countries. The Australian Government has in the recent years implemented national healthcare reform to improve the performance of and access to public hospital services. This reform extends to all public hospitals including remote hospitals. However, there is limited information on how reform...
متن کامل