The Proceedings of the 13 th Australian Information Warfare

نویسندگان

  • Craig Valli
  • Matt Warren
  • Christopher Bolan
چکیده

Traditional approaches to tactical Computer Network Defence (CND), drawn from the lessons and doctrine of conventional warfare, are based on a team of deployed security professionals countering the adversary’s cyber forces. The concept of the adversary in cyberspace does not fit neatly into the conventional military paradigms. Rather than fighting an identifiable foe, cyber adversaries are clandestine, indistinguishable from legitimate users or external services, operate across state boundaries, and from safe havens that provide sanctuary from prosecution. The defender also faces imbalances with rules of engagement and a severe disparity between the cost of delivering the defence and the attackers ability to deliver an effect. These operational conditions are more akin with Irregular Warfare (IW) than a conventional conflict. This paper proposes a new approach to CND, based on a review of the literature on IW. Rather than fight the battle alone, the CND team should concentrate efforts to persuade and empower network users to take responsibility for protecting the organisation’s critical data. This approach seeks to apply the lessons learnt from IW, where the resistance to the adoption of security best practices, intentional or otherwise, is the real adversary. This approach appears more likely to deliver long term protection from the current cyber threats than a process, which requires the identification and tracking of adversaries that are invisible and constantly changing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proceedings of the 7 th Australian Information Security Management

The status of information security in Australian medical general practice is discussed together with a review of the challenges facing small practices that often lack the technical knowledge and skill to secure patient information by themselves. It is proposed that an information security governance framework is required to assist practices in identifying weaknesses and gaps and then to plan an...

متن کامل

The Challenges of E- Proceedings in Iran

With the development of information and communication technology, the need for the plaintiffs and the use of paper has decreased in the process of proceedings, but this type of trial has many legal and executive challenges. The present research in purpose view, applied and in terms of methodology is descriptive-analytic which seeks to analyze the legal and enforcement challenges of electronic j...

متن کامل

ارزیابی الگوی پراکنش مکانی گونه‌های درختی و درختچه‌ای در جنگل‌های زاگرس مرکزی (پژوهش موردی: ذخیره‌گاه جنگلی چهارطاق)

موقعیت مکانی و اندازه ارتفاع و تاج تمام درختان و درختچه‌های متعلق به پنج گونه ارس، برودار، زبان‌گنجشک، کیکم و زالزالک روییده در کنار یکدیگر در وسعتی برابر 53 هکتار از ذخیره‌گاه جنگلی چهارطاق در زاگرس مرکزی اندازه‌گیری شدند. الگو‌های پراکنش پایه‌های هر گونه توسط چهار شاخص C، هینز، ابرهارت، پیلو و جانسون- زیمر محاسبه شدند. در کنار این شاخص‌ها، تخمین بصری و شاخص رشد آزاد (نسبت اندازه مساحت تاج به ...

متن کامل

Remote Hospital Reform in the Context of Australian Health Care Reforms

Public hospitals play an important role in the delivery of essential healthcare in Australia as in many countries. The Australian Government has in the recent years implemented national healthcare reform to improve the performance of and access to public hospital services. This reform extends to all public hospitals including remote hospitals. However, there is limited information on how reform...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012