Protection of Australia in the cyber age

Warren, Matthew J. and Leitch, Shona 2011, Protection of Australia in the cyber age, International journal of cyber warfare and terrorism, vol. 1, no. 1, pp. 35-40.

Attached Files
Name Description MIMEType Size Downloads

Title Protection of Australia in the cyber age
Author(s) Warren, Matthew J.
Leitch, Shona
Journal name International journal of cyber warfare and terrorism
Volume number 1
Issue number 1
Start page 35
End page 40
Total pages 6
Publisher IGI Global
Place of publication Hershey, Pa.
Publication date 2011-01
ISSN 1947-3435
1947-3443
Keyword(s) critical infrastructure protection
cyber sarfare
national security policy
security agencies
security threats
Summary Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.
Language eng
Field of Research 080699 Information Systems not elsewhere classified
Socio Economic Objective 899999 Information and Communication Services not elsewhere classified
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2011, IGI Global
Persistent URL http://hdl.handle.net/10536/DRO/DU:30041850

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 87 Abstract Views, 7 File Downloads  -  Detailed Statistics
Created: Wed, 01 Feb 2012, 11:19:09 EST by Katrina Fleming

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.