Attorney General reveals CERT workload

Powered by SC Magazine
 

First stats on new response team.

View larger image View larger image View larger image

See all pictures here »

CERT Australia has reported that it received 1,000 requests for assistance during its first eight months of operation with a quarter of requests escalated to the Cyber Security Operations Centre.

Attorney-General Robert McClelland revealed the figures while speaking about Australia's involvement in the international cyber security exercise, Cyber Storm III, in parliamentary question time.

CERT Australia was now the ‘official' computer emergency response team. The Government-run computer emergency response team started operating in late January 2010.

"CERT Australia received 1,000 requests for assistance," McClelland said.

"About a quarter were deemed to warrant significant assistance from the Cyber Security Operations Centre", he said, which was operated by the Defence Signals Directorate.

The Cyber Storm III exercise simulated cyber attacks targeting critical infrastructure and other nationally important systems and services.

It was the third exercise of its kind that Australia had taken part in. It also included involvement from the US, UK, Canada, New Zealand and "over 50 organisations from the communications, finance, transport, government and utilities sectors."

Copyright © iTnews.com.au . All rights reserved.


 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 709

Vote