{"id":21793,"date":"2015-07-29T14:18:11","date_gmt":"2015-07-29T04:18:11","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=21793"},"modified":"2015-07-30T11:36:19","modified_gmt":"2015-07-30T01:36:19","slug":"cyber-wrap-81","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Kuala<\/a>This morning the Australian Cyber Security Centre released its first unclassified threat report on the online threat environment that Australia faces, including cyber espionage, cyber attack, and cybercrime. It explains that these threats are delivered by RATs, Malware and watering hole attacks. The report also contains several case studies and mitigation advice for organisations to help protect themselves. The full report can be accessed here.<\/a><\/p>\n

The Washington Post<\/em> has a good piece<\/a> on why the US government has chosen not to publically assign blame for the high-profile OPM Hack. Quoting \u2018senior administration officials\u2019 the article explains that the government is keen to not tip its hand and reveal detailed evidence tying the attack to a particular adversary, as it may reveal its own cyber espionage capabilities.<\/p>\n

It\u2019s interesting to see in this case how the US\u2019 ideological views have solidified around the issue of economically motivated vs government hacking. The US generally views cyberattacks against government as falling under the umbrella of \u2018traditional espionage\u2019 which should be met with an equally secretive response. Attacks against the private sector, such as the Sony hack, are met with an altogether more public and high profile response including public attribution and sanctions. While the US continues to make this delineation, in other countries where economic success is more readily tied to government success, this differentiation won\u2019t be adopted anytime soon.<\/p>\n

In the lead up to the 2020 Summer Olympics, the Japanese government has announced<\/a> a massive push to train 50,000 people in both the government and private sectors to help protect against cyber threats. The Ministry of Internal Affairs and Communications will put forward a set of proposals totalling 20 billion yen to government. Included in the proposals are \u2018competitive training exercises\u2019 to help identify and train talent from schools, local level authorities and small to medium businesses. Also slated<\/a> for creation are industry-wide forums for the sharing of knowledge and best practice among private companies. The proposals follow an announcement by the Information-technology Promotion Agency that 160,000 of Japan\u2019s 265,000 information security personnel lack the required skills to adequately carry out their job.<\/p>\n

Malaysia\u2019s Ministry of Science, Technology and Innovation has launched<\/a> a national Internet of Things (IoT) Roadmap. The roadmap launched by Minister Dr Ewon Ebin, is intended to serve as an implementation guideline for an industry estimated to contribute a total of 9.5 billion ringgit (AUD $3.3 billion) to Malaysia\u2019s gross national income by 2020. The Minister lauded the country\u2019s tech expertise, solid investment climate and strong government IoT commitment in a push to show the country can become a regional IoT hub.<\/p>\n

NextGov has produced a nice list of women \u2018cyber guardians\u2019 to watch. Although women make up only about 14% of global government IT workers (with even less in the private sector at 11% in 2013), this hasn\u2019t stopped an influential group of ladies from academia, private industry and government rising to the top of their fields. Closer to home, the Commonwealth Bank\u2019s Chief Information Security and Trust Officer Ben Heyes recently wrote a great piece<\/a> detailing the shortage of female IT professionals, why industry needs to be more active in their recruitment of a more diverse workforce and the benefits different perspectives can bring to business outputs.<\/p>\n

Wrapping up this week, the Russian Government\u2019s official public procurement site fell victim<\/a> to an embarrassing defacement recently when intruders managed to place a contract on the site for the \u2018control of Russia\u2019. The property management contract gave the winning bidder rights to \u2018rule the [Russian] state and turn a profit\u2019, the \u2018property\u2019 included \u2018the whole of the Russian Federation, including Crimea and Sevastopol, a population of 146 million, lots of oil, gas, forests, land and whatnot.\u2019 But the hackers cautioned the property came with \u2018a few million officials who also believe they have the right to turn a profit from the Russian Federation.\u2019<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

This morning the Australian Cyber Security Centre released its first unclassified threat report on the online threat environment that Australia faces, including cyber espionage, cyber attack, and cybercrime. It explains that these threats are delivered …<\/p>\n","protected":false},"author":133,"featured_media":21795,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[95,135,102,687,1378,163],"class_list":["post-21793","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber-security","tag-japan","tag-malaysia","tag-olympic-games","tag-opm-hack","tag-russia"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This morning the Australian Cyber Security Centre released its first unclassified threat report on the online threat environment that Australia faces, including cyber espionage, cyber attack, and cybercrime. It explains that these threats are delivered ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-29T04:18:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-30T01:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/07\/4932412841_abc39c71de_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"457\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/07\/4932412841_abc39c71de_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/07\/4932412841_abc39c71de_z.jpg\",\"width\":640,\"height\":457,\"caption\":\"Kuala Lumpur, Malaysia\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/#primaryimage\"},\"datePublished\":\"2015-07-29T04:18:11+00:00\",\"dateModified\":\"2015-07-30T01:36:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"This morning the Australian Cyber Security Centre released its first unclassified threat report on the online threat environment that Australia faces, including cyber espionage, cyber attack, and cybercrime. It explains that these threats are delivered ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-07-29T04:18:11+00:00","article_modified_time":"2015-07-30T01:36:19+00:00","og_image":[{"width":640,"height":457,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/07\/4932412841_abc39c71de_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/07\/4932412841_abc39c71de_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/07\/4932412841_abc39c71de_z.jpg","width":640,"height":457,"caption":"Kuala Lumpur, Malaysia"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/#primaryimage"},"datePublished":"2015-07-29T04:18:11+00:00","dateModified":"2015-07-30T01:36:19+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-81\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21793"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=21793"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21793\/revisions"}],"predecessor-version":[{"id":21822,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21793\/revisions\/21822"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/21795"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=21793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=21793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=21793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}