Leanpub Header

Skip to main content

The Australian Cyber Security Handbook

2024 UPDATE

If you are a student or practitioner of cyber security in Australia you are no longer restricted to texts that are primarily focused on overseas experiences. Finally there is a book that was written for you, describing the unique environment that you operate in daily.

Free With Membership

With Membership

Free!

$19.99

You pay

$19.99

Author earns

$15.99
$

...Or Buy With Credits!

You can get credits monthly with a Reader Membership
PDF
EPUB
WEB
About

About

About the Book

The Australian Cyber Security Handbook is intended to fill a void in the existing literature by being the only general textbook written specifically from an Australian context. The work represents years of accumulated research followed by many months of drafting, revision, editing and further revision to present, in a single volume, a comprehensive guide to the cyber security context, threat landscape, protective measures, professional practice and the Australian cyber security industry.

All chapters are liberally sprinkled with local examples & case studies, local statistics, references to the Australian legal framework, and solutions that meet sovereign risk.

It is anticipated that The Australian Cyber Security Handbook will provide a single text suitable for use in courses across both vocational and higher education sectors, as well as an invaluable daily "go to" for Australian cyber security practitioners.

Author

About the Author

John Burgess

John Burgess is an IT industry veteran with over 30 years experience in the computer, software development and information security fields.

Since 2019 John has taught cyber security at Victoria University, Melbourne (www.vu.edu.au), where he is currently the Senior Educator of VU’s Department of Digital Transformation. John has been the Cyber Security Course Lead at VU since mid 2020.

John is a PECB Certified IEC/ISO 27001 Lead Auditor and has undertaken information security assessments for a wide range of Australian clients.

John holds a Bachelor of Commerce degree with dual majors in Accounting and Management Information Systems, a Graduate Diploma in Document Management (awarded with Distinction), and a Master of Business degree in the field of Information Innovation. He is a member of the Australian Computer Society and the Australian Information Security Association. 

Contents

Table of Contents

Preface

About the Author

  1. INTRODUCTION

1 - A Short History of Cyber Security in Australia

  1. Recent Events
  2. How to use this book
  3. PART I - THE CYBER SECURITY CONTEXT

2 - Strategic cyber security: a risk management approach

  1. Learning Objectives
  2. Risk management
  3. Identifying vulnerabilities
  4. Prioritising action
  5. Risk treatment choices
  6. Risk management challenges
  7. Threat hunting
  8. Chapter Summary

3 - Human Vulnerabilities

  1. Learning Objectives
  2. Protecting Human Interests
  3. Human Risk Factors
  4. Controlling human vulnerabilities
  5. Chapter Summary

4 - Device Vulnerabilities

  1. Learning Objectives
  2. Personal computing device architecture
  3. Modern device types & form factors
  4. Modern desktop operating systems
  5. Device attack-vectors
  6. Networks introduce a new attack-vector
  7. Chapter Summary

5 - Network Vulnerabilities

  1. Learning Objectives
  2. Introduction to computer networking
  3. Network components
  4. Networking risks
  5. IP Addressing Schemes
  6. Important Network Protocols
  7. TCP/UDP Vulnerabilities
  8. Putting it All Together
  9. Chapter Summary
  10. PART II - THE THREAT LANDSCAPE

6 - Privacy & data breach

  1. Learning Objectives
  2. Data breach threat actors
  3. Data breach threat goals
  4. The mandatory notifiable data breach (NDB) scheme
  5. Notifiable Data Breach Trends
  6. Australia’s fragmented data protection regime
  7. International schemes
  8. Other legal implications
  9. Recent Data Breach Examples in Australia
  10. Chapter summary

7 - Insider Threats

  1. Learning Objectives
  2. Insider Threat Actors
  3. Insider Threat Goals
  4. The insider problem
  5. Characteristics of insider attacks
  6. Extent of insider attacks
  7. Other considerations
  8. Chapter Summary

8 - Cyber-crime

  1. Learning Objectives
  2. Australia’s legal system
  3. History and trends
  4. Legal implications for ethical hackers
  5. Cyber-crime threat actors & threat goals
  6. Attack Methods & Vectors
  7. Hacker Threat Goals
  8. Malware & Ransomware
  9. Denial of Service
  10. Social engineering
  11. Cocktail attacks
  12. Chapter Summary

9 - Advanced Persistent Threats

  1. Learning Objectives
  2. State threat actors
  3. APT threat goals
  4. Cyber warfare
  5. APT activities in Australia
  6. Other Response Approaches
  7. Ransomware Gangs
  8. Chapter Summary

10 - The Dark Web

  1. Learning Objectives
  2. Characteristics of the Dark Web
  3. Accessing the Dark Web
  4. Why law enforcement permits Dark Web tools to continue to operate
  5. Hacker resources
  6. Chapter Summary
  7. PART III - IMPLEMENTING APPROPRIATE DEFENCES

11 - Applying cyber security standards and frameworks in pursuit of best security practice

  1. Learning Objectives
  2. ISO 27001
  3. NIST SP “800” series Special Publications
  4. Comparing ISO 27k and NIST-800
  5. The Information Security Manual
  6. Other cyber security standards and frameworks
  7. Authentication, Authorisation, and Accounting (AAA)
  8. Chapter Summary

12 Cyber security planning & Policies

  1. Learning Objectives
  2. Some Terminology
  3. Matching risks and controls
  4. Defence in Depth
  5. Policy architecture
  6. Continuous improvement
  7. Chapter Summary

13 - Securing a Network with technical controls

  1. Learning Objectives
  2. The network perimeter
  3. Endpoint Detection & Response
  4. The role of Zero-Trust architecture in a perimeter-less world
  5. Chapter Summary

14 - Protecting the Cloud

  1. Learning Objectives
  2. It’s just someone else’s computer
  3. Adapting on-premise methods to the cloud
  4. Cloud Vulnerabilities
  5. Controls and counter-measures suitable in a cloud environment
  6. Cloud-Based Security Tools
  7. Chapter Summary

15 - Protecting physical infrastructure

  1. Learning Objectives
  2. Physical security controls
  3. Case Study
  4. Attacking physical controls
  5. HVAC
  6. Assets used by remote workers
  7. Preventative maintenance
  8. Internet of Things
  9. Self-driving vehicles & Drones
  10. Chapter Summary

16 - Protecting people (from themselves)

  1. Learning Objectives
  2. Access and authentication
  3. Cyber awareness
  4. Cyber-hygiene
  5. Chapter Summary

17 - Cyber Security Operations

  1. Learning objectives
  2. The Cyber Security Operations Centre (CSOC)
  3. Cyber security operations in smaller organisations
  4. Chapter summary

18 - The Cyber Security Profession in Australia

  1. Learning Objectives
  2. Cyber security professional bodies
  3. Industry Promotion and Advocacy
  4. Government Cyber Agencies & Programs
  5. Education & Industry certifications
  6. Cyber ranges for practical skills development
  7. Cyber Security Events
  8. Local cyber security influencers
  9. Chapter summary

19 The Australian Cyber Security Industry

  1. Learning Objectives
  2. Snapshot of the Australian Cyber Security Industry
  3. Australian cyber security start-ups
  4. Challenges
  5. Chapter summary
  6. LOOKING TO THE FUTURE

20 - Trends and Emerging Threats

  1. Learning objectives
  2. Recent Australian Trends
  3. My Top 6 Short-term Predictions for Cyber Security in Australia
  4. Chapter Summary

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earned over $14 million writing, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub