{"id":19446,"date":"2015-04-01T14:30:27","date_gmt":"2015-04-01T03:30:27","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=19446"},"modified":"2015-05-12T16:20:04","modified_gmt":"2015-05-12T06:20:04","slug":"cyber-wrap-67","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Of<\/a><\/p>\n

Taiwan\u2019s Vice Premier Simon Chang wants in<\/a> on the US government\u2019s Cyber Storm exercises. A biennial exercise series curated by the Department of Homeland security, Cyber Storm tests the capacity of agencies and critical infrastructures to absorb and respond to cyber attacks. Several foreign government agencies, including Australia, have been invited to participate in the exercises in the past. Chang argues that the move would help strengthen the countries\u2019 defences against unrelenting attacks from China. US cyber security firm FireEye released figures in 2014 that showed Taiwan faced the most targeted attacks that sought to steal data in the Asia-Pacific region, a large proportion of which targeted government networks.<\/p>\n

US coding site GitHub knows all about unrelenting attacks. The site is enduring<\/a> the sixth day of a massive DDos attack. The attacks have been traced back to Chinese search engine Baidu and are targeting two specific pages. One, GreatFire, develops ways for users to circumvent the so-called \u2018great firewall of China\u2019. The other is a Chinese mirror page for the blocked New York Times<\/em> website. The company has successfully managed to deflect a large amount of the DDos traffic, which is positive given the amount of companies and programmers who rely on the site as a coding resource.<\/p>\n

The US has taken China to the WTO over its proposed<\/a> new banking technology restrictions, with some success. The new rules, proposed in December were set to force banks to have \u2018all new computer servers, desktop computers and laptop computers and 50 percent of new tablets and smartphones meet “security and controllability” requirements\u2019. These moves were developed to encourage \u2018indigenous innovation\u2019 and promote \u2018cybersecurity\u2019. However, the US government challenged<\/a> the plan, arguing that they challenged the WTO fair trade rules. It seems that their protests have gained some traction as China has \u2018suspended\u2019 the regulations, for now.<\/p>\n

While bigger international security issues continue to grab headlines, more mundane cybercrime is arguably far more damaging to the overall stability and security of cyberspace. As Charles Henderson, vice president of managed security testing at Trustwave, characterised the threat to point-of-sale devices<\/a>, \u2018It’s not some ninjas coming through the ceiling on ropes, putting malware on your point of sale in the dead of night\u2026 It’s fairly easy attacks.\u2019 The reason that simple attacks can wreak such havoc is that so many businesses are not taking the most basic steps to improve the security of their systems and lack of deep-dive testing.<\/p>\n

Of course, one cannot blame businesses for forgoing pragmatic steps to improve cybersecurity when government is setting such a poor example. An Auditor-General\u2019s report found that the information security of four of Tasmania\u2019s largest state bodies<\/a> were lacking, with all the departments failing to fully implement the top four mitigation strategies from the Australian Signals Directorate<\/a>. The Department of Treasury and Finance and the Department of Primary Industries, Parks, Water and Environment struck back, claiming that state agencies do not require the same level of cyber protection as Federal Departments and that the costs don\u2019t justify implementation of these measures.<\/p>\n

One group not taking the cyber threat so lightly are lawyers<\/a>. With further data retention and breach notification legislation in the works, cyber risk insurance market is set to boom and as the Australian Security and Investments Commission continues to focus on incident reporting, companies are likely to \u2018face greater compliance and regulatory burden\u2019 in cyber risk management.<\/p>\n

While greater investment in business cybersecurity would be a welcome step, without proper information sharing within the private sector and between government and businesses, the cards will remain heavily stacked against the defenders. Step one to facilitate information sharing is building trust, no easy task. Deepak Jeevankumar<\/a> offers a call to arms and a few suggestions to bridge the trust chasm, including the appointment of Chief Trust Officers and expiration dates for data. The US Congress<\/a> has been set to take a crack at this challenge as well, however Jennifer Granick<\/a> tempers expectations, calling this a banner year for flawed cyber information sharing proposals.<\/p>\n

Of course all of this will be moot when the robots take over<\/a>. DARPA is kicking off a two-year competition to lay the groundwork for automated cyber defence. Although very much at its early stages and a fully-automated systems is not likely anytime soon, initial tests have been promising and these systems could offer a more cost effective way for companies to automatically spot and fix vulnerabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"

Taiwan\u2019s Vice Premier Simon Chang wants in on the US government\u2019s Cyber Storm exercises. A biennial exercise series curated by the Department of Homeland security, Cyber Storm tests the capacity of agencies and critical infrastructures …<\/p>\n","protected":false},"author":153,"featured_media":19447,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,391,169,95,765,670,1207],"class_list":["post-19446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyber","tag-cyber-crime","tag-cyber-security","tag-darpa","tag-robots","tag-wto"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Taiwan\u2019s Vice Premier Simon Chang wants in on the US government\u2019s Cyber Storm exercises. A biennial exercise series curated by the Department of Homeland security, Cyber Storm tests the capacity of agencies and critical infrastructures ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-01T03:30:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-05-12T06:20:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/6590201161_c37fe97cf1_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/6590201161_c37fe97cf1_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/6590201161_c37fe97cf1_z.jpg\",\"width\":640,\"height\":426,\"caption\":\"Of course all of this will be moot when the robots take over\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/#primaryimage\"},\"datePublished\":\"2015-04-01T03:30:27+00:00\",\"dateModified\":\"2015-05-12T06:20:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Taiwan\u2019s Vice Premier Simon Chang wants in on the US government\u2019s Cyber Storm exercises. A biennial exercise series curated by the Department of Homeland security, Cyber Storm tests the capacity of agencies and critical infrastructures ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-04-01T03:30:27+00:00","article_modified_time":"2015-05-12T06:20:04+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/6590201161_c37fe97cf1_z.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/6590201161_c37fe97cf1_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/6590201161_c37fe97cf1_z.jpg","width":640,"height":426,"caption":"Of course all of this will be moot when the robots take over"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/#primaryimage"},"datePublished":"2015-04-01T03:30:27+00:00","dateModified":"2015-05-12T06:20:04+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-67\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19446"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=19446"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19446\/revisions"}],"predecessor-version":[{"id":20344,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19446\/revisions\/20344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/19447"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=19446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=19446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=19446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}