G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR2008
来源IDRR-2008-WFHF
Exploring Cyber Security Policy Options in Australia
Igor Mikolic-Torreira; Don Snyder; Michelle Price; David A. Shlapak; Sina Beaghley; Megan Bishop; Sarah Harting; Jenny Oberholtzer; Stacie L. Pettyjohn; Cortney Weinbaum; et al.
发表日期2017-08-07
出版年2017
页码14
语种英语
结论

Government Solutions to Improve Cyber Security and Protect Consumers Must Consider Interconnected Factors

  • Participants saw a need for improved reporting processes that protect businesses from financial consequences while also protecting consumers whose data have been compromised.
  • Participants questioned how the Australian government could hold device manufacturers accountable for cyber security breaches without stifling innovation. Many of the technologies sold in Australia are manufactured abroad, highlighting a need for international partnerships to strengthen cyber security.
  • Participants questioned whether the standard required to assign attribution for cyber attacks in an Australian court of law should be the same as that used to assign attribution for state-sponsored attacks.

Security Is Not Designed into Products, Indicating a Role for Government to Develop Cyber Security Standards

  • Consumers are insufficiently informed about security, and manufacturers, importers, and retailers are not incentivised to build and sell secure devices. A security logo visible on product packaging could inform users' purchasing decisions, leading to financial incentives for sellers.
  • Participants felt that users should be able to opt out of digital connectedness and data sharing, though many devices today do not offer these options. Further, this connectedness sometimes provides no obvious value to the user.
摘要

Today's cyber environment presents unlimited opportunities for innovation, interaction, commerce, and creativity, but these benefits also bring serious security challenges. Satisfactory solutions will require building partnerships among public and private organizations, establishing mechanisms and incentives to foster routine information sharing and collective defense, and educating users about their role in thwarting increasingly sophisticated attacks. RAND developed and conducted a cyber security exercise in Canberra, Australia, that aimed to capture the widest possible range of stakeholder perspectives. Participants represented government, the private sector, think tanks and academic institutions, industry associations, and the media. The goal was to explore the challenges Australia faces in securing cyberspace by placing pressure on government authorities, industry capabilities, users' tolerance for malicious cyber activity, and the ability to develop interdisciplinary solutions to pressing cyber security challenges. The exercise was structured around two plausible cyber security scenarios set in the near future, and this was the third in a series of cyber security exercises developed by RAND. The two prior exercises were conducted in the United States — in Washington, D.C., and at the University of California, Berkeley, near Silicon Valley. Like these prior events, the Australian exercise provided a rich set of observations and options to strengthen cyber security and enforcement while protecting the benefits afforded by a free and open Internet.

目录 Exploring Cyber Security Policy Options in Australia | RAND
主题Australia ; Cybercrime ; Cybersecurity ; Data Science ; The Internet
URLhttps://www.rand.org/pubs/research_reports/RR2008.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/523351
推荐引用方式
GB/T 7714
Igor Mikolic-Torreira,Don Snyder,Michelle Price,et al. Exploring Cyber Security Policy Options in Australia. 2017.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR2008.pdf(656KB)智库出版物 限制开放CC BY-NC-SA浏览
1502134248780.jpg(9KB)智库出版物 限制开放CC BY-NC-SA缩略图
浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Igor Mikolic-Torreira]的文章
[Don Snyder]的文章
[Michelle Price]的文章
百度学术
百度学术中相似的文章
[Igor Mikolic-Torreira]的文章
[Don Snyder]的文章
[Michelle Price]的文章
必应学术
必应学术中相似的文章
[Igor Mikolic-Torreira]的文章
[Don Snyder]的文章
[Michelle Price]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR2008.pdf
格式: Adobe PDF
文件名: 1502134248780.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。