{"id":29096,"date":"2016-10-12T12:30:02","date_gmt":"2016-10-12T01:30:02","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=29096"},"modified":"2016-10-12T11:35:23","modified_gmt":"2016-10-12T00:35:23","slug":"cyber-wrap-138","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

The Australian Cyber Security Centre released its second annual Threat Report today<\/a>, providing a useful breakdown of the number and type of cyber incidents that the Centre has dealt with in 2016, and some interesting case studies. The report notes that between January 2015 and June 2016 the Australian Signals Directorate managed 1,095 serious cyber secuirty incidents on government systems, compared to 1,131 in 2014. An additional 14,804 incidents affecting businesses were managed by CERT Australia between July 2015 and June 2016. Of those incidents, 18% targeted the energy sector and 17% targeted the banking and finance sector. Keep an eye on The Strategist<\/em> in the coming days for more analysis of the report from the ICPC team.<\/p>\n

The ACSC Threat Report was released during Australia\u2019s Stay Smart Online week<\/a>. As part of the festivities, an updated Stay Smart Online Small Business guide<\/a> and two new Security Awareness Implementation guides<\/a>\u2014one for businesses and one for individuals\u2014have been released. Stay Smart Online week began in 2008, and now has 1,700 partners from the government and private sector. The 2016 event has been timed to coincide with Cyber Security Awareness Month<\/a> in the US, ConnectSmart<\/a> week in New Zealand and the European Cyber Security Month<\/a>.<\/p>\n

In the US, the Department of Homeland Security and the Office of the Director of National Intelligence issued a joint statement<\/a> on election security. The statement declares the US intelligence community\u2019s confidence that the hack and subsequent leak of information from the Democratic National Committee<\/a> was directed by the Russian government (and definitely not a 400 pound hacker<\/a>). Reflecting on \u2018the scope and sensitivity\u2019 of the efforts,\u2019 the statement noted that \u2018only Russia’s senior-most officials could have authorized these activities\u2019, which are similar to Moscow\u2019s public-opinion influencing activities across Europe and Eurasia. It isn\u2019t unusual for the US to publically attribute cyber incidents to other countries,<\/a> but the implication that Russia is attempting to interfere in the US election may complicate the response. Adam Segal from the Council on Foreign Relations<\/a>, and David Sanger and Nicole Perlroth in The New York Times<\/em><\/a> have written some good analysis to this end.<\/p>\n

Just a few short weeks after Donald Trump\u2019s bizarre<\/a> comments about \u2018the cyber\u2019<\/a>, he has released his campaign\u2019s cybersecurity policy<\/a>. Trump proposes to fight cybercrime with federal, state and local joint task forces (just like the US fights the mafia), and to turn offensive cyber capabilities into America\u2019s \u2018greatest weapon against the terrorists\u2019. Over at CFR, David Fidler notes<\/a> that the policy is broadly consistent with current US cyber policy, albeit short on specifics. See here<\/a> for a comparison of Trump and Clinton\u2019s cyber security policy statements.<\/p>\n

Staying in the US, the sale of Yahoo! to Verizon has apparently hit a snag, with the company\u2019s massive data breach<\/a> apparently prompting Verizon to ask for a US$1 billion discount off<\/a> the agreed US$4.8 billion sale price. What isn\u2019t yet clear is how much Yahoo! knew about the 2014 breach, which wasn\u2019t discovered until this year, during the negotiations with Verizon. One US senator has called for the Securities and Exchange Commission to investigate Yahoo!<\/a> to uncover whether the company was untruthful in its public disclosures.<\/p>\n

Russia and India are set to sign a new cyber agreement next week<\/a> when Vladimir Putin visits Goa for the annual Indo-Russian summit. Indian media reports suggest that the agreement will focus on fighting online extremism from groups including Islamic State and Pakistani groups such as Lashka-e-Taiba. Israel is also apparently waiting in the wings<\/a> to assist India with strengthening its cyber security capability.<\/p>\n

And finally, Singapore\u2019s government announced its new cyber security strategy this week<\/a>, developed by the Cyber Security Agency of Singapore. The strategy<\/a> has four key components: hardening security, educating people, creating jobs and working with friends. The strategy comes shortly after the establishment of two new government digital services agencies last week<\/a>. The Government Technology Agency (GovTech), will provide the engineering and data skills required to accelerate the provision of e-government services. Current projects include a digital vault for personal data and big data analysis of indicators\u2014electricity consumption and public transport, for example\u2014to identify precise locations of business growth or contraction.<\/p>\n

The creation of GovTech was announced shortly after the merger of the Infocomm Development Agency and the Media Development Authority on 30th September<\/a> The new Info-communications Media Development Authority will work with the private sector to facilitate improved digital economic outcomes for the city state through incentives and streamlined regulations. Singapore\u2019s PM Lee Hsien Loong arrived in Canberra yesterday<\/a> evening for a three day visit to discuss the first tranche of work under the bilateral Comprehensive Strategic Partnership<\/a>, including defence,trade and law enforcement. The importance of cybersecurity to both countries means that cyber issues will likely be a key point of discussions between Turnbull and Lee.<\/p>\n","protected":false},"excerpt":{"rendered":"

The Australian Cyber Security Centre released its second annual Threat Report today, providing a useful breakdown of the number and type of cyber incidents that the Centre has dealt with in 2016, and some interesting …<\/p>\n","protected":false},"author":364,"featured_media":29098,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,1428,69,163,50],"class_list":["post-29096","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-donald-trump","tag-india","tag-russia","tag-singapore"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The Australian Cyber Security Centre released its second annual Threat Report today, providing a useful breakdown of the number and type of cyber incidents that the Centre has dealt with in 2016, and some interesting ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-12T01:30:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-12T00:35:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/8012351593_60cbfc4acd_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/8012351593_60cbfc4acd_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/8012351593_60cbfc4acd_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"Image courtesy of Flickr user Jorge Cancela.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/#primaryimage\"},\"datePublished\":\"2016-10-12T01:30:02+00:00\",\"dateModified\":\"2016-10-12T00:35:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The Australian Cyber Security Centre released its second annual Threat Report today, providing a useful breakdown of the number and type of cyber incidents that the Centre has dealt with in 2016, and some interesting ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-10-12T01:30:02+00:00","article_modified_time":"2016-10-12T00:35:23+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/8012351593_60cbfc4acd_z.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/8012351593_60cbfc4acd_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/8012351593_60cbfc4acd_z.jpg","width":640,"height":427,"caption":"Image courtesy of Flickr user Jorge Cancela."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/#primaryimage"},"datePublished":"2016-10-12T01:30:02+00:00","dateModified":"2016-10-12T00:35:23+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-138\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29096"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=29096"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29096\/revisions"}],"predecessor-version":[{"id":29099,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29096\/revisions\/29099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/29098"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=29096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=29096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=29096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}