- The Strategist - https://www.aspistrategist.org.au -
2013 review - the year in cybsecurity
Posted By Jessica Woodall on December 20, 2013 @ 11:00
2013 was a significant year in cyberspace, both internationally and closer to home. Whilst the Edward Snowden leaks dominated the headlines, several important agreements and policy achievements were made further away from the glare of the media spotlight.
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/2013-review-the-year-in-cybsecurity/
[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2013/07/cyber-logo.jpg
[2] announced: http://www.defence.gov.au/defencenews/stories/2013/jan/0124.htm
[3] isn’t ready for occupancy: http://www.townsvillebulletin.com.au/news/breaking-news/asio-still-waiting-to-move-into-new-hq/story-fnjbnvyi-1226762824469
[4] Cybersecurity executive order: http://www.zdnet.com/obamas-cybersecurity-executive-order-what-you-need-to-know-7000011221/
[5] effectively guaranteeing: http://www.informationweek.com/government/cybersecurity/nist-cybersecurity-framework-dont-underestimate-it/d/d-id/1112978
[6] borrow from: http://www.aspistrategist.org.au/cyber-security-for-australias-critical-infrastructure/
[7] report: http://intelreport.mandiant.com/
[8] PLA Unit 61398: http://www.smh.com.au/it-pro/security-it/unit-61398--the-featureless-12storey-building-which-houses-one-of-the-worlds-most-dangerous-and-secretive-cyberhacking-operations-20130220-2eqj4.html
[9] seems to have resumed its activities: http://www.nytimes.com/2013/05/20/world/asia/chinese-hackers-resume-attacks-on-us-targets.html?_r=0
[10] debatable: https://www.aspi.org.au/publications/special-report-enter-the-cyber-dragon-understanding-chinese-intelligence-agencies-cyber-capabilities
[11] important: http://www.reuters.com/article/2013/07/10/us-china-usa-cyber-idUSBRE96904820130710
[12] agreement: http://articles.washingtonpost.com/2013-06-17/world/40025979_1_cyber-security-pact-homeland-security
[13] decision: http://www.un.org/ga/search/view_doc.asp?symbol=A/68/156
[14] leaking: http://www.aspistrategist.org.au/looking-through-the-prism/
[15] should: http://www.theaustralian.com.au/news/world/totalitarian-states-lack-of-privacy-means-snowden-has-failed/story-e6frg6ux-1226776477069
[16] report: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf
[17] theft: http://abcnews.go.com/Politics/theft-35-fighter-jet-info-called-major-problem/story?id=19440826
[18] release: http://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Pages/default.aspx
[19] National Security Strategy: http://www.dpmc.gov.au/national_security/national-security-strategy.cfm
[20] Defence White Paper: http://www.defence.gov.au/whitepaper2013/
[21] praise: http://www.aspistrategist.org.au/putting-runs-on-the-board-australia-and-international-cyberspace/
[22] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/