Skip navigation
Skip navigation

Cyber Defence and Warfare

Ball, Desmond; Waters, Gary

Description

The 2013 Defence White Paper includes security against major cyber attacks on Australia as an element of our �defence of Australia� national strategic interest. It devotes a separate section to cyber in its strategic outlook. While the White Paper makes heartening comment about the need to integrate cyber power into national strategy, it provides no insights into how this might be achieved, nor does it set any real strategic direction for an improved whole-of-nation effort. It does not attempt...[Show more]

dc.contributor.authorBall, Desmond
dc.contributor.authorWaters, Gary
dc.date.accessioned2015-12-07T22:25:33Z
dc.identifier.issn1833-1459
dc.identifier.urihttp://hdl.handle.net/1885/21355
dc.description.abstractThe 2013 Defence White Paper includes security against major cyber attacks on Australia as an element of our �defence of Australia� national strategic interest. It devotes a separate section to cyber in its strategic outlook. While the White Paper makes heartening comment about the need to integrate cyber power into national strategy, it provides no insights into how this might be achieved, nor does it set any real strategic direction for an improved whole-of-nation effort. It does not attempt to identify any cyber objectives that should underpin Australia�s national security strategy. Australia needs to develop a current baseline cyber posture, derive a consolidated view of all requirements and gaps, and develop future remediation and implementation plans in an integrated fashion. Without this, cyber capability gaps across the Australian Government will continue to hinder the agencies� ability to plan for and conduct effective operations. Accordingly, this article calls for a comprehensive capabilities-based assessment, a national cyber capability plan, and an implementation plan (with specific actions and implementation responsibilities, timeframes, and performance measures) and a funding strategy for addressing any gaps resulting from the assessment. It also calls for a clearer articulation of operational planning considerations, including dealing with the conflation of electronic warfare and cyber warfare, and the use of uninhabited aerial vehicles for improved intelligence collection and network penetration.
dc.publisherKokoda Foundation
dc.sourceSecurity Challenges
dc.source.urihttp://www.securitychallenges.org.au/TOCs/vol9no2.html
dc.titleCyber Defence and Warfare
dc.typeJournal article
local.description.notesImported from ARIES
local.identifier.citationvolume9
dc.date.issued2013
local.identifier.absfor160604 - Defence Studies
local.identifier.ariespublicationu5530201xPUB16
local.type.statusPublished Version
local.contributor.affiliationBall, Desmond, College of Asia and the Pacific, ANU
local.contributor.affiliationWaters, Gary, Independent consultant
local.description.embargo2037-12-31
local.bibliographicCitation.issue2
local.bibliographicCitation.startpage91
local.bibliographicCitation.lastpage98
dc.date.updated2020-11-15T07:26:12Z
local.identifier.thomsonID000214066800012
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01_Ball_Cyber_Defence_and_Warfa_2013.pdf169.43 kBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  17 November 2022/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator