blog




  • Essay / Cybercrime in Australia - 972

    Australia depends on technology. Everything from state security to economics and information collaboration is more accessible, leading to increased reliance on digital networks. The rapid increase in cyber activity has a symbiotic relationship with cybercrime. The evolving nature of cybercrime constantly makes countermeasures obsolete in the face of these new technologies. Australia is not taking enough action against cybercrime, with its inaction based on Australia's previous focus on combating terrorism. This study will use the Australian National Security Strategy 2013 to show the growing trend towards cybersecurity. Unfortunately, the Australian government is not up to the task of addressing this growing phenomenon. Recently, cybercrimes, including Anonymous attacks and Wiki leaks, prove that no network is completely secure. This study will conclude that the exponential growth of the Internet has resulted in an inability to manage it properly, regardless of government strategies implemented. Cyber ​​activity has increased exponentially while security strategies lag. Defense funding identifies Australia's defense priorities over the past decade, highlighting counter-terrorism as the greatest security risk. The 2013 National Security Strategy continues to view the fight against terrorism as its main threat. Concern about cybercrime is evident in the strategy, which encourages integrated policy development, but the threat is not the subject of any substantive counter-strategy. In recent years, large-scale information breaches published and posted online demonstrate the vulnerability of systems, including infrastructure. Anonymous and Ransomeware case studies raise questions about government's ability to counter cybercriminals...... middle of article ......es_committees?url=coms/cybercrime/report.htm > consulted on 03/15/14 Lee, John (01/25/13) “China must be confronted on cybersecurity” ABC http://www.abc.net.au/unleashed/4483046.html > consulted on 03/12/ 14Moses, Asher (02/10/10) "Hackers Bring Down Government Websites". The Age http://www.theage.com.au/technology/technology-news/operation-titstorm-hackers-bring-down-government-websites-20100210-nqku.html> accessed 03/15/14 Petallides, CJ ( 2012). “Cyberterrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat.” Student Pulse, Vol 4, No 3 Accessed online http://www.studentpulse.com/a?id=627> on 03/12/14 Thomas, Emily (01/16/14) “International Child Sex Abuse Sting Operation IDs Hundres Suspects » The Huffington Post. Accessed <http://www.huffingtonpost.com/2014/01/16/philippine-cybersex-den_n_4605033.html> on 14/03/14