- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on December 16, 2015 @ 12:30

2568510756_c1a4620ed8_z [1]

We’re kicking off this week over the ditch with our Kiwi friends who have been very busy on the cyber policy front. In Auckland last Friday, Communications Minister Amy Adams launched an updated version of the country’s national Cyber Security Strategy [2]. The NZ government also produced an accompanying ‘living’ Action Plan [3] that will be updated annually, and a National Plan [4] to Address Cybercrime. The strategy aims to deepen public–private engagement on cyber issues building upon the already successful Connect Smart [5] initiative, which reaches out to private residences, schools and businesses. Other initiatives include a ‘cyber security tick’ scheme, similar to those used to indicate healthy foods, which will recognise businesses with good cyber security practices. New Zealand will also establish a stand-alone national Computer Emergency Response Team (CERT). Currently [6] CERT responsibilities lie within the National Cyber Security Centre, but the decision has been made to bring New Zealand ‘into alignment’ with its key international partners by creating the new body. The decision mirrors that of the UK government, which successfully launched [7] their first national CERT early last year.

Australia’s national CERT has released [8] a survey of the cyber security postures and attitudes present amongst its major Australian businesses partners. The survey found that over half of the respondents had experienced an incident that had compromised ‘confidentiality, integrity or availability of a network’s data or systems in the last year’. Positively, the survey found that in response many businesses had introduced or improved their information security practices including both policy and technical responses. Mirroring stories throughout [9] the media [10] this year, major Australian businesses reported being subject to a substantial amount of Ransomware attacks—four times [11] as many as were reported in 2013.

Twitter has warned a number of its users this week that their accounts may have been targeted [12] by something a bit more malicious than the usual run-of-the-mill spam. The social media giant informed several account holders via email that their Twitter accounts were part of ‘a small group of accounts that may have been targeted by state-sponsored actors’. Those affected included activists, security specialists and privacy advocates, in what Twitter believes was an attempt to gain access to personal information including phone numbers and email addresses. While Twitter claims there was no evidence [13] that the attempts were successful, it recommended that those affected use identity protections measures, such as the Tor browser.

Joe Nye had an interesting piece [14] published on Project Syndicate on deterrence in cyber space, where he discusses how the traditional difficulties surrounding attribution have hampered effective deterrence and tipped the see-saw in favour of attackers. But he stresses that increased technological capability, more robust encryption and economic enmeshment may tip the advantage back to the defenders and eventually enable more effective cyber deterrence.

And finally, just in time for the holiday break, the US Department of Homeland Security has put out a useful tip sheet [15] on good cybersecurity practices to use while travelling. It includes advice on connecting to Wi-Fi, data protection and maintaining the physical security of personal devices.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-101/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/12/2568510756_c1a4620ed8_z.jpg

[2] Cyber Security Strategy: http://www.dpmc.govt.nz/sites/all/files/publications/nz-cyber-security-strategy-december-2015.pdf

[3] Action Plan: http://www.dpmc.govt.nz/sites/all/files/publications/nz-cyber-security-action-plan-december-2015.pdf

[4] National Plan: http://www.dpmc.govt.nz/sites/all/files/publications/nz-cyber-security-cybercrime-plan-december-2015.pdf

[5] Connect Smart: https://www.connectsmart.govt.nz/

[6] Currently: https://www.aspi.org.au/publications/cyber-maturity-in-the-asia-pacific-region-2015/Cyber-Maturity-2015.pdf#page=54

[7] launched: http://www.computerweekly.com/news/2240217221/UK-finally-launches-national-cyber-emergency-team

[8] released: https://www.cert.gov.au/newsroom

[9] throughout: https://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=newssearch&cd=8&cad=rja&uact=8&ved=0ahUKEwjcmrO39d7JAhUBj5QKHRAxA2UQqQIIMigAMAc&url=http%3A%2F%2Fwww.bbc.com%2Fnews%2Ftechnology-35091714&usg=AFQjCNEWt_hSMpt8_Ea2AmFU43oolvCcCg&bvm=bv.110151844,d.dGo

[10] media: http://www.wired.com/2015/09/hacker-lexicon-guide-ransomware-scary-hack-thats-rise/

[11] four times: https://www.cert.gov.au/system/files/614/679/2013%20CERT%20Australia%20Cyber%20Crime%20%2526%20Security%20Survey%20Report.pdf

[12] targeted: http://www.digitaljournal.com/technology/twitter-warns-users-targeted-in-state-sponsored-cyber-attacks/article/452052

[13] no evidence: http://www.reuters.com/article/us-twitter-hack-idUSKBN0TX06L20151215

[14] piece: https://www.project-syndicate.org/commentary/cyber-warfare-deterrence-by-joseph-s--nye-2015-12

[15] tip sheet: http://www.dhs.gov/sites/default/files/publications/Cybersecurity%20While%20Traveling_7.pdf

Copyright © 2016 The Strategist. All rights reserved.