Viw Magazine

Men's Weekly

.

  • Written by Stanley Shanapinda, Research Fellow, La Trobe University
There is no clear cybersecurity governance framework geared towards detecting and preventing attacks against digital identity assets.

One of the key functions of the government is to collect and archive national records. This includes everything from property records and registers of births, deaths and taxes, to Parliamentary proceedings, and even the ABC’s digital library of Australian news and entertainment.

A new report released today from the Australian Strategic Policy Institute (ASPI) considers the important role these records play as the collective digital identity of our nation.

The report’s author, Anne Lyons, explains how an attack on these records could disrupt the day-to-day functioning of society, and why we need to do more to protect them.


Read more: Hooray, we're digital natives – so who preserves our culture?


Why are these records important?

Given that we live in the digital era, our digital identity records have been transformed into electronic data and are stored virtually in cloud servers. These servers act as the memory centre of the nation, preserving Australia’s unaltered history.

We can trust these records are accurate, confidential and not interfered with. All this digital information may be referred to as “digital identity assets”.

These assets are worth protecting, because they are important for the functioning of government, and are a legacy for future generations. Collectively, they embody who and what Australia is as a nation, its journey, and its time and place in history.

What could happen if they were hacked?

The impact of any theft, manipulation, destruction or deletion of digital identity assets could be catastrophic.

The courts would not be able to function without the relevant digital records. Manipulated property title deeds could create legal challenges. Passports and visas may not be able to be verified and issued. And historic records could be tampered with or forged.

In the worst-case scenario, such an attack could interfere with the proper functioning of government, and shatter public trust and confidence in government institutions.

Lyons paints a picture of what it would look like if property records were hacked:

You wake up in 2022 to discover that the Australian financial system’s in crisis. Digital land titles have been altered, and it’s impossible for people and companies to prove ownership of their assets. The stock market moves into freefall as confidence in the financial sector evaporates when the essential underpinning of Australia’s multitrillion-dollar housing market – ownership – is thrown into question. There’s a rush to try to prove ownership, but nowhere to turn. Banks cease all property lending and business lending that has property as collateral. The real estate market, insurance market and ancillary industries come to a halt. The economy begins to lurch.


Read more: Preservationists race to capture cultural monuments with 3D images


What are we doing to prevent attacks?

Three pieces of legislation have been passed since 2017 to protect the nation against crimes committed over the internet targeting telecommunications, water, electricity and gas equipment. These are the Security of Critical Infrastructure Act, the National Security Legislation Amendment (Espionage and Foreign Interference) Act and the Telecommunications and Other Legislation Amendment Act.

But cyber attacks are not only targeted at our nation’s critical infrastructure. Servers that host digital identity assets are also at risk. Nation states and individual hackers could gain access to databases using our email communications to gain access.

Despite this risk, our lawmakers have failed to exert the same vigour in crafting laws that protect digital identity assets as they have exerted in efforts to decrypt the WhatsApp messages of criminal targets.

There is no clear and specific cybersecurity governance framework in the law books geared towards detecting and preventing attacks against these assets.

How to protect our digital heritage

1. Assess cyber vulnerabilities alongside social ones

Governments need to improve their holistic situational awareness to counter threats. That means assessing cyber vulnerabilities in conjunction with societal ones.

Online disinformation campaigns and malicious cyber activities are all referred to as hybrid threats. Hybrid threats – which could make use of digital identity assets – are challenging to detect and to make sense of due to their dynamic nature. Understanding the complex nature of a hybrid threat is referred to as cyber situational awareness.

Outside of the cyber environment, situational awareness may refer to an awareness of cultural, ethnic and religious tensions in society that could be vulnerable to online exploitation. For example, in the 1980s the Soviet government used the HIV epidemic to sow social division in the United States. Under operation INFEKTION, Russia spread stories that the American government created the virus and spread it among its population.

In cases like this, it’s feasible that digital health records could be hacked and altered to serve as fake evidence. In this way, societal vulnerabilities can become one part of a mixed bag of threats.

Our ability to effectively resist and recover from malicious hybrid activities depends on our capacity to detect, analyse and understand the nature of the threat, in near real time. Metadata can be used for this purpose to show who accessed a server and from what location.

To improve cyber situational awareness, access logs should be retained and the computer emergency response team must collect metadata from government departments themselves, and analyse the data in near real time. This is a growing trend in the cybersecurity sector and public bodies must gear up.

2. Store copies of historical records offline

We also need to simulate how digital identity assets can be used against us and be prepared to counter the propaganda. Schools and universities can store multiple offline historic records, which can be used to verify accuracy when conflicting stories arise. Using National Archives as a central repository for digital identity assets is a single point of failure. Redundancy work-arounds must be created.


Read more: How the internet is reshaping World Heritage and our experience of it


3. Engage the private sector

This is a job too big and too important to be left to government alone. Historical societies and charitable organisations may need to store hard and soft copies of the same records all over the country. Relevant laws must mandate, cybersecurity situational awareness for telecommunications companies, ISPs, computer emergency response teams, law enforcement and security agencies, but in clear and responsible fashion.

We must take a proactive approach that mandates the roll out of appropriate advance counter measures. A legal mandate that is largely based on past incidents may not be an effective strategy to prevent dynamic hybrid threats. This is how we will tell hackers to back off our national heritage.

Stanley Shanapinda does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

Authors: Stanley Shanapinda, Research Fellow, La Trobe University

Read more http://theconversation.com/protecting-our-digital-heritage-in-the-age-of-cyber-threats-108252

VR Training in Australia – Conflict Resolution Training For Employees

In today’s rapidly evolving workplaces, Australian organisations are turning to immersive learning tools like VR to handle specialised n...

Financial Planning For Couples

Why Every Couple Should Talk About Money And A Will (Before It’s Too Late) When you’re in a new, exciting relationship, it’s easy t...

Navigating Relationships While Living with Depression

Living with depression can feel like carrying an invisible weight—one that not only affects how you experience the world but also how yo...

Choosing the Right Vinyl Flooring Suppliers for Your Home or Business

When it comes to selecting flooring options that combine durability, style, and affordability, vinyl flooring stands out as a top choice. ...

Why Food Manufacturing Cleaning Services Are Essential for Safety and Quality

The complexity of food production environments demands specialised cleaning approaches that go beyond regular janitorial work. This is whe...

The Importance of Choosing the Right Industrial Electrician Melbourne for Your Business

When it comes to powering large-scale operations and complex machinery, commercial electrical services are not enough. Industrial environm...

What to Expect During a Property Settlement After Separation

Separation is a challenging and emotional time, and one of the most complex aspects can be the division of property. However, understandin...

Designing the Ideal Healthcare Environment with a Professional Medical Centre Fitout

When it comes to healthcare spaces, functionality, hygiene, and patient comfort take top priority. An intelligently designed medical centr...

Stay Comfortable Year-Round with Ducted Cooling Melbourne

When the temperature starts to rise, having a reliable and efficient cooling system becomes a priority. With unpredictable weather and sud...

Best Practices for Content Ownership and Tagging Across Departments

Image by kaboompics on Freepik The bigger and more complex content ecosystems grow, the more valuable ownership and tagging become. In ent...

Understanding Public Liability Insurance Australia: What You Need to Know

Image by rawpixel.com on Freepik The necessity of public liability insurance in Australia is that it acts as a financial safeguard for busi...

How HID Proximity Cards Improve Workplace Security Without Slowing Down Access

In today’s workplaces, security is non-negotiable, but so is speed. Companies are under pressure to protect their people, property, and ...

Unlock Business Insights Faster with Power BI Tools

In this digital age where data drives the consumer landscape, businesses are shipping huge amounts of data every day. To remain competit...

Why Split System Installation Is a Smart Choice for Home Climate Control

Temperature control is essential for comfort, and when it comes to efficient, versatile cooling and heating, a split system is one of the ...

The Ultimate Guide to Door Replacement: Everything You Need to Know

Image by freepik Sure, swapping out a door is a fairly easy task, but it requires careful consideration of options for materials, designs...

Common Web Development Issues Perth Businesses Face (and How Agencies Fix Them)

Image by freepik Let's be honest, in the bustling heart of Perth's business scene, a website that's not up to scratch is like trying to he...

Life With Clear Aligners: 10 Small Changes That Make a Big Difference

Image by tonodiaz on Freepik Clear aligners have transformed orthodontics, offering a nearly invisible way to straighten teeth without the...

Choosing the Right Hair Loss Treatment for Your Needs

Millions of people experience hair loss globally, and it can be a major cause of emotional discomfort and self-consciousness. Hair loss ca...

Cardboard Display Boxes: An Effective Solution for Retail Presentation

In the competitive world of retail, how products are presented can be just as important as the products themselves. Cardboard display boxe...

Why Hiring a Skilled Shopify Web Developer Can Transform Your Online Store

Shopify has become one of the most popular e-commerce platforms due to its ease of use, powerful features, and scalability. However, creat...