These days, everyone is talking about cyber security. The topic was trending last year on Census night when the Australian Bureau of Statistics was forced to pull down its website as a result of a series of “distributed denial of service” attacks. Earlier in the year, Prime Minister Turnbull had announced that our reliable source of weather information, the Bureau of Meteorology, experienced a cyber attack in 2015. The PM softened the blow by unveiling $230 million of funding for a national Cyber Security Strategy.

Maybe because we don’t speak the language of cyber security – lawyers often make the dangerous assumption that IT professionals are best left to deal with cyber risks. But, as I explained in my post on cyber resilience, lawyers need to take a leading role in maintaining security in the digital age. Lawyers are desirable targets for cyber attacks and stand to lose a lot from a successful breach. In-house practitioners have an added burden: in their role as corporate gatekeepers, they are expected to stay active in mitigating risks for their organisations – and that includes cyber risks.

Term Definition
Cyber security The systems and processes used to protect computer networks from being attacked, disrupted, accessed without authorisation or otherwise damaged.
Malware Short-hand for “malicious software”. It is a broad term that refers to a range of software programs developed to attack computer systems.
Ransomware A type of or way of using malware for extortion purposes. When used for this purpose, it is common for the malware to lock a computer system. The target of the attack then needs to pay money if they want to access their computer system
Scareware Another fraudulent tactic involving the use of malware. Here, the attacker will threaten the target, which is then tricked by the malware into buying software that is unnecessary or even harmful.
Trojan A type of malware that borrows its name from the story of the Trojan Horse in Greek mythology. Just like the horse, the Trojan disguises itself as legitimate software that should be invited onto a computer. The target is then tricked into downloading the software, which is, in fact, harmful.
Virus Another type of malware. Similarly to the use of the word in the medical context, a virus needs human action to spread.
Worm Unlike a normal virus, a worm can reproduce without human intervention. It does so by exploiting weaknesses or ‘vulnerabilities’ in the operating system of a computer.
Distributed denial of service attack This type of attack occurs when a large number of computers make simultaneous requests, with the aim of overwhelming a target system (like a website). A trojan is often on the scene to rally the computers involved in the attack.
Redundancy Additional capacity in a computer network above what is needed for normal operation. The purpose of building redundancy into a network is to provide a fallback option if the network is unavailable for some reason. A bit of redundancy might be helpful if you’re facing a distributed denial of service attack.

It Doesn’t End There

Understanding the terminology and the common forms of cyber attacks are the first steps in recognising any intrusion warning signs. Obviously, there’s much more to learn about cyber security than this short list of terms, but it’s an important first step. Lawyers in particular need to be proactive about understanding cyber risks and building cyber resilience for their businesses and their clients, due to the nature of their job as trusted advisors and protectors of privileged information.

Do you have thoughts about the current state of cyber security in Australia you want to share with us? Reach out on Twitter or LinkedIn.

Thomas Kaldor
If you would like further information on any of the topics mentioned in this article, please get in touch using the form on this page.
Would you like to get in touch with Thomas about this topic, or ask us any other question? Please fill out the form below to send Thomas a message!