国产精品

Media contact

Cecilia Duong
国产精品 News & Content
02 9065 1740
cecilia.duong@unsw.edu.au

2022 proved to be a rough year in the cybersecurity space.

While cyber warfare played out in global markets, Australia was also hit with its own kind of cyberattacks. Last year, Optus reported its system had been hacked, exposing the personal details of its 9.7 million customers. Weeks later, Medibank suffered a similar fate.

Defending cyberattacks have become increasingly difficult as cyber attackers are continuously evolving their strategies and techniques to bypass the security mechanisms deployed by the targeted organisations.

However, 国产精品 cybersecurity experts Professor Sanjay Jha and Dr. Jiaojiao Jiang听have developed new modelling听to help businesses strengthen their cyber threat intelligence.

The model is used to help funding partner, Avertro, toughen its own Cyber Management Decision System platform called CyberHQ. Aimed at supporting businesses with their cybersecurity capabilities, the platform can also identify, track, and manage cyber risks for executives at the business level, as well as cybersecurity teams at the technical level.

鈥淚n today鈥檚 modern world, businesses need to keep up with the latest cyber threat intelligence to withstand any chance against an attack,鈥 says Prof. Jha, Chief Scientist and Director Research of .听

鈥淥ur aim is to use the latest cyber security research and translate it in a way to empower businesses to make informed decisions 鈥 which will ultimately benefit the public.鈥

Read more:听

Cyber whispers

Many corporate cybersecurity programs on the market usually draw data from either internal sources or external sources.

However, this poses two major limitations: most of them provide scores and metrics that are mainly derived from one type of source, either internal or external sources, and secondly, they are incapable of learning the dynamic evolutionary patterns of cyber threats.

To address this, the modelling inputted into Avertro CyberHQ draws from both internal sources such as system logs, network equipment, boundary security devices, and antivirus systems,听and external sources听such as popular social media platform, Twitter. It uses artificial intelligence to learn patterns of cyber threats and grades the business according to the predicted level of risk it poses.

Why the focus on social media as another source? Dr. Jiang says they typically see cyber security experts, and even the hackers themselves, discuss crucial technical information about trending attacks and new and emerging cyber threats on social media, blogs, and forums.

鈥淲hat we鈥檝e found is that there is usually online chatter within the hacker network about potential threats before a cyberattack takes place,鈥 says Dr. Jiang.

鈥淲e鈥檙e taking advantage of this behaviour by listening and analysing this information and feeding it into Avertro's CyberHQ听to empower businesses听using the platform to make informed cybersecurity decisions.

鈥淭he modelling gathers all this chatter about the attack and determines how much of a risk it poses to the business,鈥 she says.

鈥淔or example, if we鈥檙e seeing talk online about a potential threat to Outlook, CyberHQ then warns businesses that also use Outlook.鈥

Ian Yip, CEO and Founder or Avertro and 国产精品 Software Engineering alumnus, says cybersecurity is no longer just a technical issue and that cybercriminals have made it a business and social issue.

鈥淚ndustry is not evolving fast enough, which is why we have seen an increase in the number of cyber incidents,鈥 he says.

鈥淕ood cyber resilience is only possible with the right culture within an organisation, and culture in any place is dictated by its leaders.鈥

Read more:听

Cyber landscape

Findings from the Australian Cyber Security Centre (ACSC) 2021/2022 Annual Cyber Threat Report found there was increase in the number and sophistication of cyber threats, making crimes like extortion, espionage, and fraud easier to replicate at a greater scale.

In that year alone, the ACSC received over 76,000 cybercrime reports, an increase of nearly 13 per cent from the previous financial year.

What happened with Optus and Medibank last year should be taken as a big wake up call for other businesses to take cybersecurity more seriously, warns Prof. Jha. He says cases of identity theft are on the rise in Australia, and around the world, and the public should be reassessing how much personal information they willingly share.

鈥淚n a time where anything, including buying groceries, can be done in the palm of your hand, it鈥檚 meant people are left to trust external parties with private information,鈥 he says.

鈥淲e鈥檝e entered this tricky period where it鈥檚 normal for a business to ask for your birthday when you鈥檙e buying something online or set pop ups when you visit their website asking you to sign up to their newsletter.

鈥淲hy would a retailer need to know my birthday? It鈥檚 very unnecessary.

鈥淲hat we should be doing is sharing our details on a needs-to-know basis and there should be expiration dates on collected data.

鈥淚 do not want a company sending me emails听10 years down the track about their product because I used their services once.鈥