181 resultados para cyber-terrorism

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and
Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry adoption and acceptance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to  coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems.

This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group is presented in support of the developed framework for SCADA industry adoption and acceptance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This chapter examines a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The chapter proposes a high level managerial framework, which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry acceptance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the new millennium approaches, we are living in a society that is increasingly dependent upon information technology. However, whilst technology can deliver a number of benefits, it also introduces new vulnerabilities that can be exploited by persons with the necessary technical skills. Hackers represent a well-known threat in this respect and are responsible for a significant degree of disruption and damage to information systems. However, they are not the only criminal element that has to be taken into consideration. Evidence suggests that technology is increasingly seen as potential tool for terrorist organizations. This is leading to the emergence of a new threat in the form of 'cyber terrorists', who attack technological infrastructures such as the Internet in order to help further their cause. The paper discusses the problems posed by these groups and considers the nature of the responses necessary to preserve the future security of our society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This chapter examines a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The chapter proposes a high level managerial framework, which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry acceptance.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Terrorist groups are in theory currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber arena to coordinate cyber based attacks. This paper examines a proposed cyber-terrorism SCADA risk framework concept. The paper proposes a conceptual framework which is designed to measure and protect the threat of cyber-terrorism against SCADA systems within Australia. The findings and results of a focus group will be examined to help validate the framework concept.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book is a collection of papers originally presented at a workshop entitled 'After Nine Eleven: Ethics in the Time of Terror' hosted by Monash University on 24 June 2005. The workshop participants included members of the Ethics of War and Peace (EWAP) working group which was inaugurated at the first Oceanic Conference on International Studies in July 2004. EWAP provides a cross-disciplinary forum for scholars and non-academic professionals to exchange and debate ideas on topics including the ethics of armed intervention, the Just War, pacifist ethics, international humanitarian law, ethics in the military profession, and the relationship between law, ethics and politics.

The chapters within this book examine themes including 'lesser evils' and 'dirty hands' in the fight against terrorism, the ethics of intelligence gathering, humanitarian intervention, terrorism and the North-South divide, cultural equality as a response to terrorism, human rights and counterterrorism legislation, and the ethics of defending against 'bioterrorism'. 

Contributors include Alex Bellamy and Richard Devetak (University of Queensland), Baogang He (Deakin University), Christopher Michaelsen (Office for Democratic Institutions and Human Rights, Organization for Security and Co-operation in Europe), Jeremy Moses (University of Canterbury), Christian Enemark and Hugh Smith (University of New South Wales, Australian Defence Force Academy).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the wake of the Bali bombing the Australian government has proposed a number of national security measures that pose a real danger to human security in Australia and the region. These measures include renewed and increased military and intelligence exchanges with Indonesia, and laws that allow the Australian Security Intelligence Organization (ASIO) to detain people without charge or even suspicion in order to gather intelligence. In less emotional times these initiatives would be rejected as contrary to human rights concerns and Australia’s democratic traditions, which include the rule of law and due process protections. In the current climate, however, human rights and civil liberties are apt to be portrayed as unaffordable luxuries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The continuing erosion of civil liberties in Western democracies, and in particular Australia, as a response to the threat of terrorist attack - the position taken that laws eroding civil liberties will ultimately fail in its attempt to combat terrorist activity while adding to human insecurity and violence - counter-terrorism measures resulting in the militarisation of law enforcement and provoking terrorism - linking counter-terrorism with globalisation.