On Australia’s Cyber and Critical Technology International Engagement Strategy Towards 6G How Australia may become a leader in Cyberspace

Main Article Content

David Soldani

Keywords

5G, 6G, Cyber Security, Cyber defence, Zero Trust

Abstract

In response to the call by the Australian Department of Foreign Affairs and Trade for submissions on the development of Australia’s Cyber and Critical Technology International Engagement Strategy, this paper reviews the most critical technologies; related risks and opportunities; best practices, policies and security frameworks in other countries; relevant government, industry, civil society and academia cooperation initiatives; and proposes how Australia may became a leader in the global Cyberspace. To realise this vision, Australia should play a major role among selected international organizations; support the continuous evolution of critical technologies; adopt a proper technology security assurance scheme; and enforce a certification and accreditation process – against a predetermined set of appropriate security standards and policies – for security authorisation in Australia. This could be achieved with the formulation and implementation of an Australia’s defence-in-depth strategy, augmented by a Zero-Trust model, which enhances security for untrusted domains, and within trusted domains, and meets the baseline requirements of cyber security for the Internet of Things.

Downloads

Download data is not yet available.
Abstract 869 | 340-PDF-v8n4pp127-158 Downloads 52

References

3GPP. (2020a). 3GPP Release 16 Description. Retrieved from https://www.3gpp.org/release-16
3GPP. (2020b). 3GPP Release 17 Description. Retrieved from https://www.3gpp.org/release-17
3GPP. (2020c). 3GPP Security Technical Specification 33 series. Retrieved from https://www.3gpp.org/DynaReport/38-series.htm
5G Americas. (2020a). The 5G Evolution: 3GPP Releases 16 and 17. Retrieved from https://www.5gamericas.org/wp-content/uploads/2020/01/5G-Evolution-3GPP-R16-R17-FINAL.pdf
5G Americas. (2020b). Security Consideration for the 5G Era. Retrieved from: https://www.5gamericas.org/wp-content/uploads/2020/07/Security-Considerations-for-the-5G-Era-2020-WP-Lossless.pdf
Australian Government. (2019). Australia’s 2020 Cyber Security Strategy. Retrieved from https://www.homeaffairs.gov.au/reports-and-publications/submissions-and-discussion-papers/cyber-security-strategy-2020
Australian Government. (2020a). Call for Submissions: Cyber and Critical Technology International Engagement Strategy (CCTIES). Retrieved from https://www.dfat.gov.au/news/news/call-submissions-cyber-and-critical-technology-international-engagement-strategy-ccties
Australian Government. (2020b). Australia’s Cyber Security Strategy 2020. Retrieved from https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
Bartock, M., Cichonski, J., & Souppaya, M. (2020). 5G Cybersecurity – Preparing a Secure Evolution to 5G. National Institute of Standards and Technology (NIST). Retrieved from https://csrc.nist.gov/publications/detail/white-paper/2020/02/20/5g-cybersecurity-preparing-a-secure-evolution-to-5g/draft
Barton, A. (2020). Australian Cyber Security. Retrieved from https://eu.eventscloud.com/file_uploads/bbdd9c6962871568b3397cef0e43022a_TheStateofCyberSecurityUKandAustraliaWebinarSlides20200916.pdf
Batas, S., Men, M., & Smitham, M. (2020). Towards a Trustworthy Foundation to Enhance the Security of EU 5G Networks. Huawei White Paper. Retrieved from https://huawei.eu/story/trustworthiness-and-security-foundations-eu-5g
Bundesnetzagentur. (2020). Catalogue of security requirements for the operation of telecommunications and data processing systems and for the processing of personal data. Retrieved from https://ec.europa.eu/growth/tools-databases/tris/de/search/?trisaction=search.detail&year=2020&num=496
CGTN. (2020). China to build 600,000 5G bases in 2020 despite COVID-19 impact. Retrieved from https://news.cgtn.com/news/2020-06-06/China-to-build-600-000-5G-base-stations-in-2020-R65gk7tJcs/index.html
Ericsson. (2020). 5G evolution: 3GPP releases 16 & 17 overview. Retrieved from https://www.ericsson.com/en/reports-and-papers/ericsson-technology-review/articles/5g-nr-evolution
ETSI. (2020). Cyber Security for Consumer Internet of Things: Baseline Requirements. ETSI EN 303 645 V2.1.0. Retrieved from https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.00_30/en_303645v020100v.pdf
ENISA. (2019). Annual Report Telecom Security Incidents 2018. EU Cybersecurity Agency report. Retrieved from https://www.enisa.europa.eu/publications/annual-report-telecom-security-incidents-2018
European Commission. (2017). EU cybersecurity initiatives working towards a more secure online environment. Retrieved from https://ec.europa.eu/information_society/newsroom/image/document/2017-3/factsheet_cybersecurity_update_january_2017_41543.pdf
European Commission. (2019a). EU-wide coordinated risk assessment of 5G networks security. Retrieved from https://ec.europa.eu/digital-single-market/en/news/eu-wide-coordinated-risk-assessment-5g-networks-security
European Commission. (2019b). Connectivity for a Competitive Digital Single Market – Towards a European Gigabit Society. Retrieved from https://ec.europa.eu/digital-single-market/en/news/communication-connectivity-competitive-digital-single-market-towards-european-gigabit-society
European Commission. (2019c). Commission Recommendation – Cybersecurity of 5G Networks. Retrieved from https://www.europeansources.info/record/recommendation-on-cybersecurity-of-5g-networks/
European Commission. (2019d). Cybersecurity Act – ENISA and Cybersecurity Certification Framework. Retrieved from https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-act
European Commission. (2019e). The EU Cybersecurity Act. Retrieved from https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-act
European Commission. (2020a). Cybersecurity of 5G networks - EU Toolbox of risk mitigating measures. Retrieved from https://ec.europa.eu/digital-single-market/en/news/cybersecurity-5g-networks-eu-toolbox-risk-mitigating-measures
European Commission. (2020b). On Artificial Intelligence – A European approach to excellence and trust. Retrieved from https://ec.europa.eu/info/sites/info/files/commission-white-paper-artificial-intelligence-feb2020_en.pdf
Global Commission. (2019). Advancing Cyberstability. Final report. Retrieved from https://cyberstability.org/report/
Global Forum on Cyber Expertise (GFCE). (2020). Strengthening cyber capacity and expertise globally through international collaboration. Retrieved from https://thegfce.org/
GSA. (2020a). 5G Market Snapshot Member Report – August 2020. Retrieved from https://gsacom.com/technology/5g/
GSA. (2020b). 5G Devices: Executive Summary – August 2020. Retrieved from https://gsacom.com/technology/5g/
GSMA. (2020). Network Equipment Security Assurance Scheme (NESAS) – Enhancing trust in global mobile networks. Retrieved from https://www.gsma.com/security/network-equipment-security-assurance-scheme/
Huawei. (2019). Huawei Technologies (Australia) submission to the Department of Home Affairs – Australia’s 2020 Cyber Security Strategy Discussion Paper. Retrieved from https://www.homeaffairs.gov.au/reports-and-pubs/files/cyber-strategy-2020/submission-39.pdf
Industry Advisory Panel. (2020). Industry Advisory Panel Report. Retrieved from: https://www.homeaffairs.gov.au/cyber-security-subsite/files/2020-cyber-security-strategy-iap-report.pdf
Joint Research Centre. (2020). Cybersecurity – Our digital anchor. Science for Policy report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service. Retrieved from https://ec.europa.eu/jrc/en/facts4eufuture/cybersecurity-our-digital-anchor
Moore, N. (2020). Interview with Malcolm Shore: cyber security veteran, online educator and former AISA board member. Retrieved from: https://www.aisa.org.au/Public/News_and_Media/Thought-Leadership-Library/Malcom-Shore-on-cyber-security-strategy-and-IoT.aspx
Nokia. (2020). 5G Releases 16 and 17 in 3GPP – Nokia White Paper. Retrieved from https://gsacom.com/paper/5g-releases-16-and-17-in-3gpp-nokia-white-paper/
Paris Call. (2020). Ensuring international cyberspace security. Retrieved from https://pariscall.international/en/
Rose, S., Borchert, O., Mitchell, S., & Connelly S. (2020). Zero Trust Architecture. National Institute of Standards and Technology (NIST), Special Publication 800-207. Retrieved from: https://www.nist.gov/publications/zero-trust-architecture
Singapore Cyber Security Agency (CSA). (2020). Singapore’s safer cyberspace masterplan 2020 Retrieved from https://www.csa.gov.sg/news/publications/safer-cyberspace-masterplan
Smith, P. (2020). Experts bemoan lack of detail in cyber strategy. Australian Financial Review. Retrieved from https://www.afr.com/technology/experts-bemoan-lack-of-detail-in-cyber-strategy-20200806-p55j7m
Soldani, D. (2019). 5G and the Future of Security in ICT, IEEE ITNAC, Auckland, NZ. Retrieved from https://ieeexplore.ieee.org/Xplore/home.jsp
Soldani, D. (2020a). Australia’s Cyber Security: Still more work to do. Retrieved from https://huaweihub.com.au/australias-cyber-security-still-more-work-to-do/
Soldani, D. (2020b). Introduction to 5G and the path to 6G. Webinar at AWISE 2020. Retrieved from https://www.youtube.com/watch?v=D4pi1Z821fw
Soldani, D., & Illingworth, S. A. (2020). 5G AI-Enabled Automation, Wiley 5G Ref: The Essential 5G reference Online, Wiley & Sons, May. https://doi.org/10.1002/9781119471509.w5GRef225
Soldani, D., Shore, M., Mitchell, J., & Gregory, M. (2018). The 4G to 5G Network Architecture Evolution in Australia. Journal of Telecommunications and the Digital Economy, 6(4). https://doi.org/10.18080/jtde.v6n4.161
Tong, W. (2020). New Network Architecture for 6G. What next for wireless infrastructure Summit 2020. Retrieved from: https://www.youtube.com/watch?v=L4VXGQy-mQQ
US Department of Defense (DoD). (2020). 5G Strategy. Retrieved from https://www.defense.gov/Explore/News/Article/Article/1844423/dod-develops-secure-5g-mobile-telecommunication-network-strategy/