An Achilles heel: denial of service attacks on Australian critical information infrastructures

Article


Christensen, Sharon, Caelli, William J., Duncan, William D. and Georgiades, Eugenia. 2010. "An Achilles heel: denial of service attacks on Australian critical information infrastructures." Information and Communications Technology Law. 19 (1), pp. 61-85. https://doi.org/10.1080/13600831003708059
Article Title

An Achilles heel: denial of service attacks on Australian critical information infrastructures

ERA Journal ID17157
Article CategoryArticle
AuthorsChristensen, Sharon, Caelli, William J., Duncan, William D. and Georgiades, Eugenia
Journal TitleInformation and Communications Technology Law
Journal Citation19 (1), pp. 61-85
Number of Pages25
Year2010
PublisherTaylor & Francis
Place of PublicationUnited Kingdom
ISSN1360-0834
1469-8404
Digital Object Identifier (DOI)https://doi.org/10.1080/13600831003708059
Web Address (URL)https://www.tandfonline.com/doi/full/10.1080/13600831003708059
Abstract

Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia.

Keywordslegal framework and responses; critical information infrastructure protection; denial of service attacks
ANZSRC Field of Research 2020460403. Data security and protection
460499. Cybersecurity and privacy not elsewhere classified
460609. Networking and communications
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsQueensland University of Technology
Permalink -

https://research.usq.edu.au/item/z5662/an-achilles-heel-denial-of-service-attacks-on-australian-critical-information-infrastructures

  • 55
    total views
  • 0
    total downloads
  • 2
    views this month
  • 0
    downloads this month

Export as

Related outputs

One Checklist At A Time: Towards simplifying satellite internet access in Asia-Pacific
Lawal, Temitope, Jackson, Melanie and Georgiades, E.. 2023. "One Checklist At A Time: Towards simplifying satellite internet access in Asia-Pacific." Centre for Professional Legal Education Blog.
Privacy in the age of remote sensing during natural disasters in Australia and Indonesia
Lawal, Temitope, Jackson, Melanie and Georgiades, Eugenia. 2023. "Privacy in the age of remote sensing during natural disasters in Australia and Indonesia." Digital Law Journal. 4 (2), pp. 15-39. https://doi.org/10.38044/2686-9136-2023-4-2-15-39
Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform
Georgiades, Eugenia, Birt, James R. and Svantesson, Dan Jerker B. 2023. Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform. Australia. Bond University.
Why Every Law School Should Have A Legal Research Clinic
Jackson, Melanie, Georgiades, Eugenia and Edwards, Holli. 2022. "Why Every Law School Should Have A Legal Research Clinic." Centre for Professional Legal Education Blog.
The limits of protection: why confidentiality doesn't apply to personal images uploaded online
Georgiades, Eugenia. 2022. "The limits of protection: why confidentiality doesn't apply to personal images uploaded online." European Intellectual Property Review. 44 (7), pp. 387-394.
A Right That Should've Been: Protection of Personal Images on the Internet
Georgiades, Eugenia. 2021. "A Right That Should've Been: Protection of Personal Images on the Internet." Idea (Concord): the intellectual property law review. 61 (2), pp. 275-327.
Blind hope, magnificent delusions: the need for privacy protection for personal images uploaded on social networks
Georgiades, Eugenia. 2021. "Blind hope, magnificent delusions: the need for privacy protection for personal images uploaded on social networks." European Intellectual Property Review. 43 (3), pp. 148-155.
Down the Rabbit Hole: Applying a Right to Be Forgotten to Personal Images Uploaded on Social Networks
Georgiades, Eugenia. 2020. "Down the Rabbit Hole: Applying a Right to Be Forgotten to Personal Images Uploaded on Social Networks." Fordham Intellectual Property, Media and Entertainment Law Journal. 30 (4), pp. 1111-1155.
Ignoring the call for law reform: Is it time to expand the scope of protection for personal images uploaded on social networks?
Georgiades, Eugenia. 2019. "Ignoring the call for law reform: Is it time to expand the scope of protection for personal images uploaded on social networks?" Tort Law Review. 26 (3), pp. 166-176.
Protecting the image: applying a right of publicity to images uploaded on social networks
Georgiades, Eugenia. 2019. "Protecting the image: applying a right of publicity to images uploaded on social networks." European Intellectual Property Review. 41 (1), pp. 38-45.
The Limitations of Copyright: Sharing personal Images on social networks
Georgiades, Eugenia. 2018. "The Limitations of Copyright: Sharing personal Images on social networks." European Intellectual Property Review. 40 (4), pp. 230-242.
Reusing images uploaded online: how social networks contracts facilitate the misuse of personal images
Georgiades, Eugenia. 2018. "Reusing images uploaded online: how social networks contracts facilitate the misuse of personal images." European Intellectual Property Review. 40 (7), pp. 435-445.
Closing the gap between copyright and designs: an age of enlightenment or state of confusion?
Georgiades, Eugenia. 2013. "Closing the gap between copyright and designs: an age of enlightenment or state of confusion?" Information and Communications Technology Law. 22 (1), pp. 45-59. https://doi.org/10.1080/13600834.2013.778522
Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013)
Georgiades, Eugenia, Caelli, William, Christensen, Sharon and Duncan, W.D.. 2013. "Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013)." John Marshall Journal of Computer and Information Law. 30 (1).
Resolving conflicting interests: software patents versus open source
Georgiades, Eugenia. 2011. "Resolving conflicting interests: software patents versus open source." Information and Communications Technology Law. 20 (3), pp. 225-252. https://doi.org/10.1080/13600834.2011.603964
When secret use is not so secret
Georgiades, Eugenia. 2010. "When secret use is not so secret." Information and Communications Technology Law. 19 (2), pp. 165-188. https://doi.org/10.1080/13600834.2010.494054
Copyright liability for users and distributors of content sharing and communication technologies: a crossroads between past and present
Georgiades, Eugenia. 2010. "Copyright liability for users and distributors of content sharing and communication technologies: a crossroads between past and present." Information and Communications Technology Law. 19 (1), pp. 1-26. https://doi.org/10.1080/13600831003593154