Advertisement

Policy and Law: Denial of Service Threat

  • W. J. Caelli
  • S. V. Raghavan
  • S. M. Bhaskar
  • J. Georgiades
Chapter

Abstract

A set of relevant quotes could ‘set the scene’ for research into and discussion of the policy and law aspects of DoS/DDoS against global, national and defence information infrastructures (GII, NII, DII), national critical infrastructure (CNI) and the nation state itself (Information Warfare, Cyber-warfare, Electronic Warfare).

Keywords

Critical Infrastructure Domain Name System North Atlantic Treaty Organization National Information Infrastructure Computer Emergency Response Team 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    About ENISA. 2011. http://www.enisa.europa.eu. Accessed 17 Jan 2011.
  2. 2.
    Australian Computer Emergency Response Team. 2011. http://www.auscert.org.au/. Accessed 12 Jan 2011.
  3. 3.
    Australian Telegraphic History. 2011. http://en.wikipedia.org/wiki/Australian_telegraphic_history. Accessed 24 Jan 2011.
  4. 4.
    Australia’s National Computer Emergency Response Team. 2011. http://www.cert.gov.au/. Accessed 21 Feb 2011.
  5. 5.
    Cable & Wireless Worldwide. 2011. http://www.answers.com/topic/cable-wireless-jamaica-limited. Accessed 24 Jan 2011.
  6. 6.
    Commonwealth Bank – Security. 2011. http://www.commbank.com.au/help/faq/netbank/security.aspx#whatisnetcodesms. Accessed 17 Jan 2011.
  7. 7.
    Communication Convergence Bill 2001. 2011. http://164.100.24.208/ls/committeeR/communication/39.pdf. Accessed 25 Feb 2011.
  8. 8.
    Communication Division. 2011. http://planningcommission.nic.in/sectors/commun.html. Accessed 25 Feb 2011.
  9. 9.
    Communications Critical Infrastructure Resilience. 2011. http://www.dbcde.gov.au/online_safety_and_security/Communications_critical_infrastructure_resilience. Accessed 10 Jan 2011.
  10. 10.
    Critical Infrastructure Resilience. 2011. http://www.ag.gov.au/www/agd/agd.nsf/Page/Nationalsecurity_CriticalInfrastructureProtection. Accessed 10 Jan 2011.
  11. 11.
    Defence Signals Directorate. 2011. http://www.dsd.gov.au/infosec/csoc.html. Accessed 10 Jan 2011.
  12. 12.
    Department of Information Technology. 2011. http://www.mit.gov.in/content/overview. Accessed 25 Feb 2011.
  13. 13.
    Department of Information Technology, Ministry of Communications and Information Technology, Government of India. 2011. http://www.mit.gov.in/content/overview. Accessed 23 Dec 2010.
  14. 14.
    Department of Telecommunications. 2011 http://www.dot.gov.in/. Accessed 25 Feb 2011.
  15. 15.
    Eastern Telegraph Co’s System and Its General Connections. 2011. http://upload.wikimedia.org/wikipedia/commons/a/a5/1901_Eastern_Telegraph_cables.png. Accessed 25 Jan 2011.
  16. 16.
    Facebook. 2011. http://www.facebook.com/press/info.php?statistics. Accessed 1 Jan 2011.
  17. 17.
    Forum of Incident Response and Security Teams. 2011. http://www.first.org. Accessed 11 Jan 2011.
  18. 18.
    French Resistance. 2010. http://en.wikipedia.org/wiki/French_Resistance#cite_ref-source1_3-0. Accessed 31 Jan 2010.
  19. 19.
    IETF STD Index. 2011. http://www.rfc-editor.org. Accessed 8 Jan 2011.
  20. 20.
    Information Technology Crime. 2011. http://www.interpol.int/public/TechnologyCrime/default.asp. Accessed 11 Jan 2011.
  21. 21.
    Information Update for CUA Customers. 2011. http://www.cua.com.au/. Accessed 13 Jan 2011.
  22. 22.
    International Federation for Information Processing. 2011. http://www.ifip.org. Accessed 11 Jan 2011.
  23. 23.
    Internet. 2011. http://en.wikipedia.org/wiki/Internet. Accessed 5 Jan 2011.
  24. 24.
    Internet Assigned Numbers Authority. 2011. http://www.iana.org/about/. Accessed 11 Jan 2011.
  25. 25.
    Internet Corporation for Assigned Names and Numbers. 2011. http://www.icann.org/. Accessed 11 Jan 2011.
  26. 26.
    Invest India Telecom. 2011. http://www.dot.gov.in/osp/Brochure/Brochure.htm. Accessed 25 Feb 2011.
  27. 27.
    IT Act of India 2000. 2011. http://www.cyberlawsindia.net/Information-technology-act-of-inida.html. Accessed 4 Feb 2011.
  28. 28.
    ITU Activities Related to Cybersecurity. 2011. http://www.itu.int/cybersecurity/. Accessed 10 Jan 2011.
  29. 29.
    The Japanese Bombing of Darwin and Northern Australia. 2010. http://www.cultureandrecreation.gov.au/articles/darwinbombing/. Accessed 30 Dec 2010.
  30. 30.
    Kerala Police, India. 2011. http://www.keralapolice.org/newsite/hitech_need_cyberlaw.html. Accessed 4 Feb 2011.
  31. 31.
  32. 32.
    MOSAIC (Web Browser). 2011. http://en.wikipedia.org/wiki/Mosaic_(web_browser). Accessed 18 Jan 2011.
  33. 33.
    National Security Science and Technology Branch. 2011. http://www.dpmc.gov.au/nsst/index.cfm. Accessed 10 Jan 2011.
  34. 34.
    NATO, Wikipedia. 2011. http://en.wikipedia.org/wiki/NATO/. Accessed 17 Jan 2011.
  35. 35.
    No. 462 Squadron RAAF. 2011. http://en.wikipedia.org/wiki/No._462_Squadron_RAAF. Accessed 5 Jan 2011.
  36. 36.
    Organisation for Economic Cooperation and Development. 2011. http://www.oecd.org. Accessed 11 Jan 2011.
  37. 37.
    Packet Switched Network. 2011. http://en.wikipedia.org/wiki/Packetswitched_network. Accessed 14 Jan 2011.
  38. 38.
    The common criteria recognition arrangement: Purpose of the arrangement. http://www.commoncriteriaportal.org/ccra/. Accessed 11 Jan 2011.
  39. 39.
  40. 40.
    TISN for critical infrastructure resilience. http://www.tisn.gov.au/. Accessed 6 Jan 2011.
  41. 41.
    Uncitral model law. http://www.uncitral.org/. Accessed 4 Feb 2011.
  42. 42.
    Who we are, Department of the Premier and Cabinet, Queensland. http://www.premiers.qld.gov.au/about-us/who-we-are.aspx. Accessed 17 Jan 2011.
  43. 43.
    Trusted computer system evaluation criteria. Technical report DoD 5200.28-STD, USA Department of Defense, 26 Dec 1985. (Supersedes CSC-STD-00l-83, dated l5 Aug 83).Google Scholar
  44. 44.
    ISO 7498-2: 1989 Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2 Security Architecture. Technical report, International Organization for Standardization, 1989.Google Scholar
  45. 45.
  46. 46.
    (2002). R vs Boden. QCA 164.Google Scholar
  47. 47.
    SSAC advisory SAC008 DNS distributed denial of service (DDoS) attacks. Technical report, ICANN Security and Stability Advisory Committee, Mar 2006. http://www.icann.org/en/committees/security/dns-ddos-advisory-31mar06.pdf. Accessed 4 Feb 2011.
  48. 48.
    DNSSEC@ICANN 2008. Signing the root zone: A way forward toward operational readiness. http://icann.org/en/announcements/dnssec-paper-15jul08-en.pdf. Accessed 4 Feb 2011.
  49. 49.
    Intel plans to tackle cosmic ray threat. 2008. http://news.bbc.co.uk/2/hi/technology/7335322.stm. Accessed 9 Jan 2011.
  50. 50.
    The Information Technology (Amendment) Act, 2008. 2008. http://www.mit.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf. Accessed 4 Feb 2011.
  51. 51.
    Changing landscape of DDos threats and protection. 2009. http://verisigninc.com/assets/whitepaper-ddos-threats-protection-forrester.pdf. Accessed 23 Feb 2011, March 2009.
  52. 52.
    United Nations Handbook: 2009–2010: An Annual Guide for those Working with and within the United Nations. United Nations Publications, 308–314.Google Scholar
  53. 53.
    G with Integrated ADSL2 + Modem DVG834NH. 2010. http://www.netgear.com.au/au/product/routers-and-gateways/3gfemtocells/dvg834nh?gclid=CKuP9OzpzKYCFQHVbgod8VV-Gw. Accessed 18 Jan 2011.
  54. 54.
    Corporate plan, 2011–2013. 2010. http://www.nbnco.com.au/. Accessed 9 Jan 2011.
  55. 55.
    (2010, Dec). Critical ICT Infrastructure Protection in India. 2010. cyberlawsindia.blogspot.com/2010/12/critical-ict-infrastructure-protection.html. Accessed 2 Feb 2011. http://cyberlawsinindia.blogspot.com/2011/01/critical-infrastructureprotection-in.html. Cited at 11 Jan 2011.
  56. 56.
    ICANN’s First DNSSEC Key Ceremony for the Root Zone. 2010. http://www.icann.org/en/announcements/announcement-2-07jun10-en.htm. Accessed 4 Feb 2011.
  57. 57.
    icode to commence 1 December 2010. http://www.iia.net.au/. Accessed 22 Dec 2010, Oct. 27 10:14 2010.
  58. 58.
    NEC rewrites the rules for 3G rollout in India. 2010. http://www.nec.com.au/News-Media/Media-Centre/Media-Releases/NEC-rewrites-the-rules-for-3G-rollout-in-India.html. Accessed 4 Jan 2011.
  59. 59.
    Saraswat: “DRDO working on India’s own computer operating system”. The Hindu, 9 Oct 2010. http://www.thehindu.com/sci-tech/science/article821933.ece. Accessed 25 Feb 2011.
  60. 60.
    The eighth apec ministerial meeting on the telecommunications and information industry (telmin 8). 2010. http://www.soumu.go.jp/main_content/000087132.pdf. Accessed 23 Feb 2010.
  61. 61.
    A New Year wish: more digital visionaries. The Australian, 01 Jan 2011. http://www.theaustralian.com.au/news/a-new-year-wish-more-digital-visionaries/story-e6frg6n6-1225979630797. Accessed 1 Jan 2011.
  62. 62.
    Mondaq IT & Telecoms. 2011. http://www.mondaq.in. Accessed 25 Feb 2011.
  63. 63.
    Solar energy use in cell towers can reduce co2 emission: Study. 2011. http://www.businessstandard.com/india/news/solar-energy-use-in-cell-towers-can-reduce-co2-emissionstudy/122349/on. Accessed 16 Jan 2011.
  64. 64.
    The Internet Engineering Task Force. 2011. http://www.ietf.org. Accessed 11 Jan. 2011.
  65. 65.
    Ahmed, M. 2011. Driving the engine of success. The Australian, 26, 08 Jan 2011.Google Scholar
  66. 66.
    Alvestrand, H. 2004. A mission statement for the IETF: RFC 3935. Technical report, IETF Network Working Group.Google Scholar
  67. 67.
    Andreessen, M. 2011. Mosaic – The first global web browser. http://www.livinginternet.com/w/wi_mosaic.htm. Accessed 9 Jan 2011.
  68. 68.
    APEC Secretariat. 2010. APEC at a glance. "http://publications.apec.org/file-download.php?filename=211_sec_APECatAGlance_F.pdfid=1077. Accessed 23 Feb 2011.
  69. 69.
    Australian Government. 2006. Denial of service/distributed denial of service MANAGING DoS ATTACKS. http://www.dbcde.gov.au/__data/assets/pdf_file/0011/41312/DoS_Report.pdf. Accessed 23 Feb 2011.
  70. 70.
    Ball, D. 2008. Australia and cyber-warfare,  Chap. 6: An Australian Cyber-warfare Centre, 119–148. ANU, Canberra.
  71. 71.
    Ballmer, S. 2011. Remarks by Microsoft CEO Steve Ballmer at 2011 International CES Las Vegas, 5 Jan 2011. http://www.microsoft.com/presspass/exec/steve/2011/01-05CES.mspx. Accessed 7 Jan 2011.
  72. 72.
    Beckstrom, R. 2010. The new internet nation state. Internet Corporation for Assigned Names and Numbers (ICANN) As Prepared for delivery to the United Nations, Department of Economic and Social Affairs, Multi-stakeholder Consultation on Enhanced Cooperation New York. http://www.icann.org/en/presentations/beckstrom-speech-united-nations-14dec10-en.pdf. Accessed 9 Jan 2011.
  73. 73.
    Broad, W., J. Markoff, and D. Sanger. 2011. Israeli test on worm called crucial in Iran nuclear delay. New York Times. http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html. Accessed 18 Jan. 2011.
  74. 74.
    BSNL. 2011. Calcutta telephones. http://www.calcutta.bsnl.co.in/history_ctd.shtml. Accessed 25 Feb 2011.
  75. 75.
    Caelli, W. 2010. Towards the digital city: Information assurance and resilience policy. In Proceedings of the Hong Kong Institute of Engineers (HKIE) Conference “The Way to the Digital City – Sustainable Public Services and Solutions”, Hong Kong – SAR, PRC, 1–2 Nov 2010.Google Scholar
  76. 76.
    Carpenter, B. 2009. The IETF process: An informal guide. http://www.ietf.org/about/process-docs.html. Accessed 9 Jan 2011, Oct 29 2009.
  77. 77.
    Carr, J. 2010. Inside cyber warfare: Mapping the cyber underworld. Sebastopol: O’Reilly.Google Scholar
  78. 78.
    Carr, N. 2009. The big switch: Rewiring the world, from Edison to Google. New York: W.W. Norton & Co.Google Scholar
  79. 79.
    CCRA. 2011. Common criteria. http://www.commoncriteriaportal.org/. Accessed 23 Feb 2011.
  80. 80.
    Chabrow, E. 2011. 5 obstacles to infosec reform in 2011 : Some players have changed, but the issues remain the same. GovInfo Security, 7 Jan 2011. http://blogs.govinfosecurity.com/posts.php?postID=844rf=2011-01-10-eg. Accessed 9 Jan 2011.
  81. 81.
    Christensen, S., W. Caelli, W. Duncan, and E. Georgiades. 2010. An Achilles heel: Denial of service on Australian critical information infrastructure. Information and Communications Technology Law 19(1): 61–85.Google Scholar
  82. 82.
    CISCO. 2004. Distributed denial of service threats: Risks, mitigation, and best practices. Cisco Systems white paper. https://www.info-point-security.com/open_downloads/alt/cisco_wp_ddos.pdf. Accessed 23 Feb 2011.
  83. 83.
    Clarke, R. and R.K. Knake. 2010. Cyber war: The next threat to national security and what to do about it. New York: HarperCollins.Google Scholar
  84. 84.
    CNN. 1998. Heading off an electronic Pearl Harbor. CNN Tech. http://articles.cnn.com/1998-04-06/tech/9804_06_computer.security_1_hackers-national-security-cybercrime?_s=PM:TECH. Accessed 2 Jan 2010.
  85. 85.
    Creedy, S. and F. Foo. 2010. Virgin brand feeling a bit blue after computer glitch. The Australian, 25, 9 OCtober 2010.Google Scholar
  86. 86.
    de Villiers, M. 2007. Distributed denial of service: Law technology and policy. Sydney: University of New South Wales, School of Law.Google Scholar
  87. 87.
    Dudgeon, I. 2008. Australia and cyber-warfare, chapter 4: Targeting Information Infrastructures, 59–83. Canberra: ANU.Google Scholar
  88. 88.
    Dyer, J.G., M. Lindemann, R. Perez, L. van Doorn, S.W. Smith, and S. Weingart. 2001. Building the IBM 4758 secure coprocessor. IEEE Computer, 57–66, Oct 2001.Google Scholar
  89. 89.
    Dyson, E. 1997. Release 2.0: A design for living in the digital age. Viking/Penguin.Google Scholar
  90. 90.
    Evers, J. 2007. New shield foiled Internet backbone attack. http://news.cnet.com/2100-7349_3-6166107.html. Accessed 4 Feb 2011.
  91. 91.
    Fitzgibbon, J. 2009. Defending Australia in the Asia-Pacific century: Force 2030. Defence white paper. http://www.defence.gov.au/whitepaper/. Accessed 10 Jan. 2011.
  92. 92.
    Garamone, J. 2010. Cybercom chief details cyberspace defense. http://www.defense.gov/news/newsarticle.aspx?id=60987. Accessed 13 Jan 2011.
  93. 93.
    Georgiades, E. Crisis on impact: Responding to cyber attacks on critical information infrastructures. In preparation.Google Scholar
  94. 94.
    Graham, W.R., J.S. Jr. Foster, E. Gjelde, R.J. Hermann, H.M. Kluepfel, R.L. Lawson, G.K. Soper, L.L. Jr. Wood, and J.B. Woodard. 2004. Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack : Volume 1: Executive report. Technical report. http://empcommission.org/docs/empc_exec_rpt.pdf. Accessed 2 Feb 2011.
  95. 95.
    Hall, E. 2010. Former White House security advisor warns of cyber war. The World Today, ABC Radio National http://www.abc.net.au/worldtoday/content/2010/s3086792.htm. Accessed 7 Dec 2010.
  96. 96.
    Handley, M. and E. Rescorla. 2006. Internet denial-of-service considerations: RFC 4732. http://tools.ietf.org/html/rfc4732. Accessed 22 Nov 2010.
  97. 97.
    Harvey, N. 2011. 2010/11/09 – Meeting the cyber challenge. http://www.mod.uk/DefenceInternet/AboutDefence/People/Speeches/MinAF/20101109MeetingTheCyberChallenge.htm. Accessed 4 Jan 2011.
  98. 98.
    Hilvert, J. 2010. Cybercrime response a win for self-regulation. http://www.itnews.com.au. Accessed 20 Dec 2010.
  99. 99.
    Hopewell, L. 2011. NBN batteries pose disaster issue: Experts. http://www.zdnet.com.au/nbn-batteries-pose-disaster-issue-experts-339308546.htm. Accessed 13 Jan 2011.
  100. 100.
    ICANN. 2011. DNSSEC @ ICANN Signing the root zone: A way forward toward operational readiness. http://www.icann.org/en/announcements/dnssec-paper-15jul08-en.pdf. Accessed 23 Feb 2011.
  101. 101.
    ICT-India. 2011 ICT regulation toolkit. http://www.ictregulationtoolkit.org/en/PracticeNote.1222.html. Accessed 25 Feb 2011.
  102. 102.
    IndianetZone. 2008. History of Indian telecommunications. http://www.indianetzone.com/42/history_indian_telecommunications.htm. Accessed 25 Feb 2011.
  103. 103.
    ISO. 2011. Information technology – security techniques – evaluation criteria for it security – part 1: Introduction and general model. http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?csnumber=50341. Cited at 5 Jan 2011.
  104. 104.
    Jingfei, S. 2009. Solution–Mitigating interference between LTE and 2G/3G networks. Technical report.Google Scholar
  105. 105.
    Kahn, R. and V. Cerf. 2000. Al Gore and the Internet. http://amsterdam.nettime.org/Lists-Archives/nettime-l-0009/msg00311.html. Accessed 5 Jan 2011.
  106. 106.
    Kitney, D. 2011. The web whirlwind. The Weekend Australian, 1, 8 Jan 2011.Google Scholar
  107. 107.
    Koch, C. 1995. Mutable markets. CIO Magazine 9(5): 68–76.Google Scholar
  108. 108.
    Kramer, F.D., S.H. Starr, and L.K. Wentz, eds. 2009. Cyberpower and national security. Washington, DC: Center for Technology and National Security Policy.Google Scholar
  109. 109.
    Lemos, R. 2002. Security czar: Button up or get hacked. CNET News. http://news.cnet.com/2100-1001-840335.html. Accessed 31 Dec 2010.
  110. 110.
    Libicki, M. 2007. Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press.Google Scholar
  111. 111.
    Loscocco, P. and S. Smalley. 2001. Integrating flexible support for security policies into the Linux operating system. In 2001 USENIX Annual Technical Conference Boston, 25–30 Jun 2001. USENIX.Google Scholar
  112. 112.
    Lowensohn, J. 2011. Hotmail’s recent message loss hiccup explained. CNET News. http://news.cnet.com/8301-17939_109-20027726-2.html?tag=nl.e776. Accessed 8 Jan 2011. http://news.cnet.com/8301-17939_109-20027726-2.html?tag=nl.e776. Cited at 8 Jan 2011.
  113. 113.
    Maheshwari, V. 2011. Legal service India.com. http://www.legalserviceindia.com/articles/art222.htm. Accessed 25 Feb 2011.
  114. 114.
    Mallet, P. (2010, Nov 18). NATO mobilises for cyber warfare. http://www.physorg.com/news/2010-11-nato-mobilises-cyber-warfare.html: Accessed 10 Jan 2011.
  115. 115.
    Marsh, R.T. 1997. Critical foundations: Protecting America’s infrastructures – The report of the President’s Commission on Critical Infrastructure Protection. Technical report, The White House, Washington, DC. http://www.fas.org/sgp/library/pccip.pdf. Accessed 4 Jan 2011.
  116. 116.
    Australian War Memorial. 2011. 462 squadron raaf. Australian War Memorial. http://www.awm.gov.au/units/unit_11167.asp. Cited at 5 Jan 2011.
  117. 117.
    Ohlden, A. 2011. Northrop Grumman opens UK cyber security test range For evaluation of threats on large scale networks. http://www.science20.com/newswire/northrop_grumman_opens_uk_cyber_security_test_range_evaluation_threats_large_scale_networks. Accessed 26 Jan 2011.
  118. 118.
    Pauli, D. 2010. 2015, the year of cyberwar: Gartner. http://www.zdnet.com.au/2015-the-year-of-cyberwar-gartner-339307693.htm. Accessed 6 Dec 2010.
  119. 119.
    Perset, K. and S. Paltridge. 2008. The future of the internet economy. Policy brief, OECD. http://www.oecd.org/dataoecd/20/41/40789235.pdf. Accessed 4 Feb 2011.
  120. 120.
    Preimesberger, C. 2010. 2010 saw the dawn of nation-state cyber wars: Citrix CTO. eWeek. http://www.eweek.com/c/a/Cloud-Computing/2010-Saw-the-Dawn-of-NationState-Cyberwars-Citrix-CTO-430619. Accessed 31 Dec 2010.
  121. 121.
    Raichaudhuri, R. 2011. “INDIA CALLING” – The rise of the Indian telecommunications industry. http://www.indialawjournal.com/volume2/issue_3/article_by_rohan.html. Accessed 25 Feb 2011.
  122. 122.
    Rajesh. 2010. India faces disrupted internet service due to undersea cable issue. http://www.tech-exclusive.com/india-faces-disrupted-internet-service-due-to-undersea-cable-issue/. Accessed 22 Feb 2011.
  123. 123.
    Rattray, G. 2001. Strategic warfare in cyberspace. Cambridge: The MIT Press.Google Scholar
  124. 124.
    Rudd, K. 2008. Address to Heads of Agencies and members of senior executive service. http://www.apsc.gov.au/media/rudd300408.htm. Accessed 2 Feb 2011.
  125. 125.
    Rudd, K. and S.M. Krishna. 2011. Australia-India foreign ministers’ framework dialogue. foreignminister.gov.au/releases/2011/kr_mr_110120.html. Accessed 20 Jan 2011.
  126. 126.
    Rudd, K., S. Smith, W. Hague, and L. Fox. 2011 Australia-United Kingdom ministerial consultations: Joint communiqué; Sydney, 18 Jan. 2011. http://foreignminister.gov.au/releases/2011/kr_mr_110118a.html. Accessed 19 Jan 2011.
  127. 127.
    Schwartau, W. 1996. Information warfare, 2nd edn. New York: Thunder’s Mouth Press.Google Scholar
  128. 128.
    Singh, H., A. Soni, and R. Kathuria. 2003. Telecom policy reform in India, chapter 4. World Bank and Oxford University Press.Google Scholar
  129. 129.
    Stanley, P. 2002. Remembering 1942: The bombing of Darwin, 19 February 1942. Australian War Memorial presentation. http://www.awm.gov.au/atwar/remembering1942/darwin/transcript.asp. Accessed 3 Feb 2011.
  130. 130.
    Thompson, R. 2010. The sun in action. http://www.ips.gov.au/Educational/2/1/1. Accessed 9 Jan 2011.
  131. 131.
    TRAI. 2011. Telecom Regulatory Authority of India. http://www.trai.gov.in/Default.asp. Accessed 25 Feb 2011.
  132. 132.
    TRAI. 1999. New telecom policy 1999. http://www.trai.gov.in/TelecomPolicy_ntp99.asp. Accessed 25 Feb 2011.
  133. 133.
    Vixie, P. 2002. Securing the edge. http://www.icann.org/en/committees/security/sac004.txt. Accessed 4 Feb 2011.
  134. 134.
    Waters, G., D. Ball, and I. Dudgeon. 2008. Australia and cyber-warfare. Canberra: ANU Press.Google Scholar
  135. 135.
    Westervelt, R. 2011. IBM predicts rising mobile threats, critical infrastructure attacks in 2011. http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1525624,00.html?track=NL-102ad=806829asrc=EM_NLN_13112830uid=5074973. Accessed 4 Jan 2011.
  136. 136.
    Wikipedia. 2011. Public call office. http://en.wikipedia.org/wiki/Public_call_office. Accessed 25 Feb 2011.
  137. 137.
    Wikipedia. 2011. Tandem Computers Inc. Wikipedia. http://en.wikipedia.org/wiki/Tandem_Computers. Cited at 5 Jan 2011.
  138. 138.
    Wingfield, T. 2009. Cyberpower and national security, Chapter 22: International law and information operations. National Defense University Press.Google Scholar
  139. 139.
    Zakaria, F. 2008. The post American world. New York: W.W. Norton & Company.Google Scholar

Copyright information

© Springer India Pvt. Ltd. 2011

Authors and Affiliations

  • W. J. Caelli
    • 1
  • S. V. Raghavan
    • 2
  • S. M. Bhaskar
    • 3
  • J. Georgiades
    • 4
  1. 1.Faculty of Science and TechnologyQueensland University of TechnologyBrisbaneAustralia
  2. 2.Department of Computer Science and EngineeringIndian Institute of Technology MadrasChennaiIndia
  3. 3.Society for Electronic Transactions and SecurityChennaiIndia
  4. 4.Faculty of LawQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations