Technologies of Cyber Security, Information Assurance and Situational Awareness

Our work in in this area looks at the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Our aim is to conduct leading edge research focused on the systems aspect of cybersecurity, privacy and trust (software, hardware and networking) to benefit end users.

With the Internet’s underlying structure protocols and governance susceptible to attacks, the vital field of 'computational intelligence' has been adopted to tackle this problem. Our focus is predominantly around technical issues, with human-centric elements:

  • Mapping cyber interdependencies
  • Resilience standards
  • Application security
  • Information security
  • Network security
  • Disaster recovery/business continuity planning
  • End-user education
  • Information assurance in big data
  • Technologies of decision-making under pervasive insecurity

Current applications of our research include quality control in crowd source services, analytics for cloud services security, and processes management for federated cloud services. This brings together researchers with expertise in participatory sensing, mobile networking, network architectures and protocols, focusing on quality-of-service, security, and the Internet-of-Things. We also pay considerable attention to key critical sectors, such as energy, finance, banking, transportation, military and telecommunications.

We also address the challenge of pervasive dynamic security and mission continuity under conditions of escalating cyber attack, in both military and civil infrastructure domains. In particular, we look at how Australia can marshal ICT expertise both from within its own sovereign enterprise and outside it, and use this to respond to serious, persistent and escalating cyber threats with novel attack vectors. We address the challenges in practical implementation that may involve significant interaction with sovereign and non-sovereign private sector actors.

We question how Australia can position itself effectively for relevant and responsive capability in cyber science and technology, while building resilience in cyber space.