Protecting Australia against Cyberterrorism

IOSR Journal Of Humanities And Social Science (IOSR-JHSS) 22 (9):1-6 (2017)
  Copy   BIBTEX

Abstract

We talk about how to best protect Australia against cyberterrorist attacks of the type in which the offenders use a computer to attack or in which the offenders attack computers. Our concern is phenomena like Stuxnet and Ransomware, but also any attack that has not yet happened, as for our official records, so say hacking of satellite and use of its allowances to burn people alive to death. We talk about the basics, which could be the advice of FireEye, and we talk about the sophisticated, which could be what is not yet printed. We worry about actions that could be considered part of the intelligence system, so things that demand detailed study of the past and systemic plus organised collection of data in the present. We do not talk about how to deal with Acts of War: Only about how to protect our systems to best so that we do not get those happening via computer or from a computer.

Other Versions

No versions found

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Analytics

Added to PP
2021-01-27

Downloads
262 (#102,350)

6 months
60 (#93,896)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Citations of this work

No citations found.

Add more citations

References found in this work

Universal Declaration of Human Rights.United Nations - 1948 - Journal of Interdisciplinary Studies 21 (1-2):153-160.

Add more references