{"id":30474,"date":"2017-02-08T13:34:40","date_gmt":"2017-02-08T02:34:40","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=30474"},"modified":"2017-02-08T13:34:40","modified_gmt":"2017-02-08T02:34:40","slug":"cyber-wrap-150","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

Australia and Indonesia have agreed to deepen their cooperation on cyber security issues<\/a> following the latest meeting of the bilateral Ministerial Council on Law and Security. The joint communique noted<\/a> the Ministers had agreed to new initiatives including a new Australia\u2013Indonesia Cyber Policy Dialogue later this year, cyber strategy workshops in Australia to share best practice for policy development, and exchanges on lessons learned from the establishment of the Australian Cyber Security Centre to assist the creation of Indonesia\u2019s new cyber security agency. Cyber security has been a sensitive issue between the two countries since the Snowden leaks revealed that Australia had spied on former president Susilo Bambang Yudhoyono<\/a>, and the new initiatives are a welcome sign of cooperation with a key regional player.<\/p>\n

Yesterday Justice Minister Michael Keenan released the 2016 statistics for the Australian Cybercrime Online Reporting Network (ACORN)<\/a>, revealing that there wwere about 44,500 reports of cybercrime in Australia last year. The figures show that Victorians were the biggest victims of cybercrime, and that nearly half of reported incidents related to online fraud and scams. The ACORN report was released on international Safer Internet Day<\/a>, an initiative that seeks to raise awareness of cyber security and safety issues, with a particular focus on children.<\/p>\n

The Australian Signals Directorate has built on the success of its award winning Top 4 mitigation strategies<\/a> this week, releasing the \u2018Essential Eight\u2019 as part of its new Strategies to Mitigate Cyber Security Incidents.<\/a> ASD considers the eight mitigation measures to be the cyber security baseline for organisations<\/a>, and additional measures should be adopted based on the risk profile of the organisation. Combined, the eight measures create a defence posture by seeking to prevent malware running on networks, limiting the extent of incidents and aiding the recovery of data. Implementation of the Top 4 is mandatory for Australian government agencies<\/a>, but it\u2019s not clear if it will be expanded to include the four new essential mitigation measures.<\/p>\n

Saudi Arabia and Iran\u2019s ongoing cyber spat has sparked up again as up to 15 Saudi government agencies and companies have been hit by a renewed wave of Shamoon 2 malware<\/a>. Famously used in 2012 against Saudi Aramco<\/a>, the virus wipes the data on affected machines. Shamoon 2 emerged late last year and reportedly affected Saudi Arabia\u2019s Civil Aviation Authority<\/a>. Cyber security firms Symantec and Palo Alto have released analysis that indicates Shamoon 2\u2019s creators have undertaken significant preparatory work<\/a> to assist its spread. That includes the use of stolen passwords that Palo Alto reported<\/a> are likely to have been taken through phishing, based on the passwords\u2019 strength.<\/p>\n

The second edition of the Tallinn Manual was released this week<\/a> by the NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE). The manual addresses the application of international law to cyber operations in peacetime or in conflict short of war, following on from the first manual that addressed the law of armed conflict and its application to cyberspace. ICPC is pleased to be hosting the Australian launch of the Tallinn Manual 2.0 on 24 February. Register here<\/a> if you would like to come along.<\/p>\n

And finally, in the news this week, Samoa has launched a five year cyber security strategy<\/a>, noting the need to protect Samoans and build confidence in the country\u2019s economy. In the UK the Public Accounts Committee has criticised<\/a> the government\u2019s approach to cyber security. The Committee\u2019s report<\/a> calls out \u2018chaotic\u2019 data breach processes, and lack of action on personnel shortages, and calls for a plan for the new National Cyber Security Centre. In the US, Treasury has already eased some of the sanctions imposed on the Russian Federal Security Servic<\/a>e (FSB) in response to malicious Russian cyber activities including attempting to influence the 2016 US election. The changes specifically ease the restrictions on the supply of IT products to the FSB. Also in the US, a court has issued an order to Google<\/a> to retrieve information from a foreign server, reversing the precedent set by an earlier case involving Microsoft in which the court ruled data stored overseas was beyond the reach of a US warrant. In darker places, a vigilante has brought down about one fifth of the \u2018Dark Web\u2019<\/a>. The unknown actor hacked Tor hosting service Freedom Hosting II<\/a> because they believed the company was knowingly hoisting large child pornography sited. And here is an interesting account of how Google fought the massive DDoS on KrebsOnSecurity<\/a> last September.<\/p>\n","protected":false},"excerpt":{"rendered":"

Australia and Indonesia have agreed to deepen their cooperation on cyber security issues following the latest meeting of the bilateral Ministerial Council on Law and Security. The joint communique noted the Ministers had agreed to …<\/p>\n","protected":false},"author":364,"featured_media":30475,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[915,1056,391,8],"class_list":["post-30474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-asd","tag-bilateral-relations","tag-cyber","tag-indonesia"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Australia and Indonesia have agreed to deepen their cooperation on cyber security issues following the latest meeting of the bilateral Ministerial Council on Law and Security. The joint communique noted the Ministers had agreed to ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-08T02:34:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/02\/keyboard-621830_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"428\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/02\/keyboard-621830_640.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/02\/keyboard-621830_640.jpg\",\"width\":640,\"height\":428,\"caption\":\"Image courtesy of Pixabay user JeongGuHyeok.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/#primaryimage\"},\"datePublished\":\"2017-02-08T02:34:40+00:00\",\"dateModified\":\"2017-02-08T02:34:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Australia and Indonesia have agreed to deepen their cooperation on cyber security issues following the latest meeting of the bilateral Ministerial Council on Law and Security. The joint communique noted the Ministers had agreed to ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-02-08T02:34:40+00:00","og_image":[{"width":640,"height":428,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/02\/keyboard-621830_640.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/02\/keyboard-621830_640.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/02\/keyboard-621830_640.jpg","width":640,"height":428,"caption":"Image courtesy of Pixabay user JeongGuHyeok."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/#primaryimage"},"datePublished":"2017-02-08T02:34:40+00:00","dateModified":"2017-02-08T02:34:40+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-150\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30474"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=30474"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30474\/revisions"}],"predecessor-version":[{"id":30476,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30474\/revisions\/30476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/30475"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=30474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=30474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=30474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}