Preface
About the Author
- INTRODUCTION
1 - A Short History of Cyber Security in Australia
- Recent Events
- How to use this book
- PART I - THE CYBER SECURITY CONTEXT
2 - Strategic cyber security: a risk management approach
- Learning Objectives
- Risk management
- Identifying vulnerabilities
- Prioritising action
- Risk treatment choices
- Risk management challenges
- Threat hunting
- Chapter Summary
3 - Human Vulnerabilities
- Learning Objectives
- Protecting Human Interests
- Human Risk Factors
- Controlling human vulnerabilities
- Chapter Summary
4 - Device Vulnerabilities
- Learning Objectives
- Personal computing device architecture
- Modern device types & form factors
- Modern desktop operating systems
- Device attack-vectors
- Networks introduce a new attack-vector
- Chapter Summary
5 - Network Vulnerabilities
- Learning Objectives
- Introduction to computer networking
- Network components
- Networking risks
- IP Addressing Schemes
- Important Network Protocols
- TCP/UDP Vulnerabilities
- Putting it All Together
- Chapter Summary
- PART II - THE THREAT LANDSCAPE
6 - Privacy & data breach
- Learning Objectives
- Data breach threat actors
- Data breach threat goals
- The mandatory notifiable data breach (NDB) scheme
- Notifiable Data Breach Trends
- Australia’s fragmented data protection regime
- International schemes
- Other legal implications
- Recent Data Breach Examples in Australia
- Chapter summary
7 - Insider Threats
- Learning Objectives
- Insider Threat Actors
- Insider Threat Goals
- The insider problem
- Characteristics of insider attacks
- Extent of insider attacks
- Other considerations
- Chapter Summary
8 - Cyber-crime
- Learning Objectives
- Australia’s legal system
- History and trends
- Legal implications for ethical hackers
- Cyber-crime threat actors & threat goals
- Attack Methods & Vectors
- Hacker Threat Goals
- Malware & Ransomware
- Denial of Service
- Social engineering
- Cocktail attacks
- Chapter Summary
9 - Advanced Persistent Threats
- Learning Objectives
- State threat actors
- APT threat goals
- Cyber warfare
- APT activities in Australia
- Other Response Approaches
- Ransomware Gangs
- Chapter Summary
10 - The Dark Web
- Learning Objectives
- Characteristics of the Dark Web
- Accessing the Dark Web
- Why law enforcement permits Dark Web tools to continue to operate
- Hacker resources
- Chapter Summary
- PART III - IMPLEMENTING APPROPRIATE DEFENCES
11 - Applying cyber security standards and frameworks in pursuit of best security practice
- Learning Objectives
- ISO 27001
- NIST SP “800” series Special Publications
- Comparing ISO 27k and NIST-800
- The Information Security Manual
- Other cyber security standards and frameworks
- Authentication, Authorisation, and Accounting (AAA)
- Chapter Summary
12 Cyber security planning & Policies
- Learning Objectives
- Some Terminology
- Matching risks and controls
- Defence in Depth
- Policy architecture
- Continuous improvement
- Chapter Summary
13 - Securing a Network with technical controls
- Learning Objectives
- The network perimeter
- Endpoint Detection & Response
- The role of Zero-Trust architecture in a perimeter-less world
- Chapter Summary
14 - Protecting the Cloud
- Learning Objectives
- It’s just someone else’s computer
- Adapting on-premise methods to the cloud
- Cloud Vulnerabilities
- Controls and counter-measures suitable in a cloud environment
- Cloud-Based Security Tools
- Chapter Summary
15 - Protecting physical infrastructure
- Learning Objectives
- Physical security controls
- Case Study
- Attacking physical controls
- HVAC
- Assets used by remote workers
- Preventative maintenance
- Internet of Things
- Self-driving vehicles & Drones
- Chapter Summary
16 - Protecting people (from themselves)
- Learning Objectives
- Access and authentication
- Cyber awareness
- Cyber-hygiene
- Chapter Summary
17 - Cyber Security Operations
- Learning objectives
- The Cyber Security Operations Centre (CSOC)
- Cyber security operations in smaller organisations
- Chapter summary
18 - The Cyber Security Profession in Australia
- Learning Objectives
- Cyber security professional bodies
- Industry Promotion and Advocacy
- Government Cyber Agencies & Programs
- Education & Industry certifications
- Cyber ranges for practical skills development
- Cyber Security Events
- Local cyber security influencers
- Chapter summary
19 The Australian Cyber Security Industry
- Learning Objectives
- Snapshot of the Australian Cyber Security Industry
- Australian cyber security start-ups
- Challenges
- Chapter summary
- LOOKING TO THE FUTURE
20 - Trends and Emerging Threats
- Learning objectives
- Recent Australian Trends
- My Top 6 Short-term Predictions for Cyber Security in Australia
- Chapter Summary