2006 Leading Practices For Enterprise Security Governance TISN DCITA

2006 Leading Practices For Enterprise Security Governance TISN DCITA Corporate Governance is top of mind in boardrooms across Australia. It is now widely understood that effective corporate governance is required to protect the interest of an organisation’s stakeholders, which in turn protects Australia’s economic and social interests. Information Technology (IT) governance is a relatively new […]

2006 DCITA edgar dunn future electronic payments study

Future electronic payments study – DCITA Edgar Dunn June 2006

A well-functioning economy depends on effective and efficient methods for businesses to pay employees, suppliers and investors, for households to purchase goods and services, and for governments to collect taxes and make payments. The increasing adoption of information technology by businesses and households is broadening the choice of payments methods by creating the opportunity to […]

2006 Managing Denial of Service Attacks TISN DCITA

2006 Managing Denial of Service Attacks TISN DCITA With the advance of information and communication technologies, our societies are evolving into global information societies with a ubiquitous computing environment that has made cyber attacks significantly more sophisticated and threatening. One type of cyber attack that is becoming more prevalent today is that known as a […]

2005 Airport Security Policing Review Wheeler Sept 2005

2005 Airport Security Policing Review Wheeler Sept 2005 The safety and security of the people of Australia is the first duty of the Australian Government. The public has anexceptional sensitivity to aviation and airport security and a concern that criminality may lead to vulnerabilities that could be exploited by terrorists. The Review was impressed by […]

2004 Australian Critical Infrastructure Protection National Strategy March 2004

2004 Australian Critical Infrastructure Protection National Strategy March 2004 This strategy is intended to provide an overarching statement of principles for critical infrastructure protection in Australia, and outline the major tasks and assign responsibilities necessary for their application.  This strategy is for use not only by government, but also by the owners and operators of […]