External resources

The Institute of Cyber Security is committed to building a more informed cyber community through research and education.

Personalise
Filtered cards
Business data information projector board in conference room, meeting room, boardroom, Classroom, Office.

Explore

  • The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security. Their role is to help make Australia the most secure place to connect online.

    The ACSC has released and regularly updates a glossary and terminology database as a resource available to the general public, in it's efforts to keep Australia cyber safe and educated.

  • On the 31 August 2022, the Assistant Minister for Defence and Assistant Minister for Veterans' Affairs, the Hon Matt Thistlethwaite launched the 2022 Defence Information and Communications Technology Strategy.

    For more information, head to.

    Defence Cyber Security Strategy

    Download 1.13 MB PDF

  • On the 31 August 2022, the Assistant Minister for Defence and Assistant Minister for Veterans' Affairs, the Hon Matt Thistlethwaite launched the 2022 Defence Information and Communications Technology Strategy.

    Defence ICT Strategy

    Download 12.53 MB PDF

  • Cyber security is becoming an important element in curricula at all education levels. However, the foundational knowledge on which the field of cyber security is being developed is fragmented, and as a result, it can be difficult for both students and educators to map coherent paths of progression through the subject. By comparison, mature scientific disciplines like mathematics, physics, chemistry, and biology have established foundational knowledge and clear learning pathways. Within software engineering, the IEEE Software Engineering Body of Knowledge codifies key foundational knowledge on which a range of educational programmes may be built. There are a number of previous and current efforts on establishing skills frameworks, key topic areas, and curricular guidelines for cyber security. However, a consensus has not been reached on what the diverse community of researchers, educators, and practitioners sees as established foundational knowledge in cyber security.

    The Cyber Security Body of Knowledge (CyBOK) aims to codify the foundational and generally recognised knowledge on cyber security. In the same fashion as SWEBOK, CyBOK is meant to be a guide to the body of knowledge; the knowledge that it codifies already exists in literature such as textbooks, academic research articles, technical reports, white papers, and standards. Our focus is, therefore, on mapping established knowledge and not fully replicating everything that has ever been written on the subject. Educational programmes ranging from secondary and undergraduate education to postgraduate and continuing professional development programmes can then be developed on the basis of CyBOK.

    Excerpt from.


  • There is ample law that governs cyber in Australia, but much of it is unknown. An example of this ignorance is themap created by Bundesverband der Deutschen Industrie (BDI) and Deloitteshowing that Australia has “no dedicated cyber security law”. The misunderstanding arises because, while Australia has no piece of legislation dedicated solely to cyber security, it has a range of laws with similar effect that operate in areas such as critical infrastructure protection, criminal law, telecommunications regulation, privacy and consumer law.

    The first phase of this project will create a map of Australian laws that impact on cyber security and cyber resilience, to be hosted as a wiki byCommunities, in order to both (a) enhance national and international understanding of Australian law in this area, and (b) to build a community of experts and practitioners in this area appraised of developments in adjacent cyber law.

    Later phases of this project will identify gaps in the existing law that require rectification or further regulation, and develop a matrix for other countries to similarly map their legal capabilities.


  • A research stream for thefor Technology, Law & Innovation.

    The last three decades has seen substantialdevelopment and commercial and consumer use of previously unconventional forms of distributed information technologies, where sensors and microprocessors with internetworking capabilities are embedded in everyday objects and environments not previously computerised, such as cars, fridges, people and animals.The growth in the use of cyber-physical systems and Internet-enhanced objects has already brought about significant sociotechnical change, and this is unlikely to come to an end any time soon. Cyber-physical systems and connected devices have become essential in industries from manufacturing and healthcare to agriculture and environmental management, to smart homes and cities. This change brings with it some significant benefits for society, particular in the areas of: assisting those with disabilities live more independent lives; reducing traffic congestion; improving waste management, urban safety and bushfire control; increasing availability of remote healthcare and education; and supporting more efficient and sustainable infrastructure, transport, agriculture and industry.