Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Critical Infrastructure (2)
- Vulnerability (2)
- Critical infrastructure (1)
- Critical infrastructure failure and Visualisation (1)
- Digital forensics (1)
-
- Games technology (1)
- Government interference (1)
- Gulf War (1)
- Influence (1)
- Media (1)
- Media compliance (1)
- Media ethics (1)
- Normative behavior (1)
- Protection (1)
- SCADA (1)
- Security metrics; security standards; risk management; commercial metrics (1)
- Sharing (1)
- Simulation (1)
- Standards (1)
- Transactive memory (1)
Articles 1 - 6 of 6
Full-Text Articles in Entire DC Network
Protecting Critical Infrastructure With Games Technology, Adrian Boeing, Martin Masek, Bill Bailey
Protecting Critical Infrastructure With Games Technology, Adrian Boeing, Martin Masek, Bill Bailey
Australian Information Warfare and Security Conference
It is widely recognised that there is a considerable gap in the protection of the national infrastructure. Trying to identify what is in fact ‘critical’ is proving to be very difficult as threats constantly evolve. An interactive prototyping tool is useful in playing out scenarios and simulating the effect of change, however existing simulators in the critical infrastructure area are typically limited in the visual representation and interactivity. To remedy this we propose the use of games technology. Through its use, critical infrastructure scenarios can be rapidly constructed, tested, and refined. In this paper, we highlight the features of games …
A Holistic Scada Security Standard For The Australian Context, Christopher Beggs
A Holistic Scada Security Standard For The Australian Context, Christopher Beggs
Australian Information Warfare and Security Conference
Supervisory Control and Data Acquisition (SCADA) systems which control Australia’s critical infrastructure are currently demonstrating signs of vulnerabilities as they are being interconnected to corporate networks, essentially exposing them to malicious threats. This paper discusses the vulnerabilities associated with SCADA systems, as well as discussing various SCADA standards and initiatives that have been developed in recent years to mitigate such threats. The paper presents the requirement for a holistic SCADA security standard that is practical and feasible for each SCADA industry sector.
Visualisation Of Critical Infrastructure Failure, W D. Wilde, M J. Warren
Visualisation Of Critical Infrastructure Failure, W D. Wilde, M J. Warren
Australian Information Warfare and Security Conference
The paper explores the complexity of critical infrastructure and critical infrastructure failure (CIF), real life examples are used to discuss the complexity involved. The paper then discusses what Visualisation is and how Visualisation can be applied to a security situation, in particular critical infrastructure. The paper concludes by discussing the future direction of the research.
Media, Government And Manipulation: The Cases Of The Two Gulf Wars, William Hutchinson
Media, Government And Manipulation: The Cases Of The Two Gulf Wars, William Hutchinson
Australian Information Warfare and Security Conference
This paper explores the bias and manipulation of the Western mass media during the Gulf wars of 1991 and 2003. The tactics of compliance and the ethics of the press and journalists are examined. The need for a pluralist press is extolled.
Information Sharing: Hackers Vs Law Enforcement, David P. Biros, Mark Weiser, Jim Burkman, Jason Nichols
Information Sharing: Hackers Vs Law Enforcement, David P. Biros, Mark Weiser, Jim Burkman, Jason Nichols
Australian Information Warfare and Security Conference
The fields of information assurance and digital forensics continue to grow in both importance and complexity, spurred on by rapid advancement in digital crime. Contemporary law enforcement professionals facing such issues quickly discover that they cannot be successful while operating in a vacuum and turn to colleagues for assistance. However, there is a clear need for greater IT-based knowledge sharing capabilities amongst law enforcement organizations; an environment historically typified by a silo mentality. A number of efforts have attempted to provide such capabilities, only to be met with limited enthusiasm and difficulties in sustaining continued use. Conversely, the hacker community …
Security Metrics - A Critical Analysis Of Current Methods, Manwinder Kaur, Andy Jones
Security Metrics - A Critical Analysis Of Current Methods, Manwinder Kaur, Andy Jones
Australian Information Warfare and Security Conference
This paper documents and analyses a number of security metrics currently in popular use. These will include government standards and commercial methods of measuring security on networks. It will conclude with a critical look at some of the problems and challenges faced when using the metrics available today, and also with the development of new metrics.