Strategies to Mitigate Targeted Cyber Intrusions

Updated February 2014

At least 85% of the targeted cyber intrusions that the Australian Signals Directorate (ASD) responds to could be prevented by following the Top 4 mitigation strategies listed in our Strategies to Mitigate Targeted Cyber Intrusions:

  • use application whitelisting to help prevent malicious software and unapproved programs from running
  • patch applications such as Java, PDF viewers, Flash, web browsers and Microsoft Office
  • patch operating system vulnerabilities
  • restrict administrative privileges to operating systems and applications based on user duties.

The Strategies to Mitigate Targeted Cyber Intrusions are ranked in order of overall effectiveness. Rankings are based on ASD’s analysis of reported security incidents and vulnerabilities detected by ASD in testing the security of Australian government networks.

The Top 4 Strategies to Mitigate Targeted Cyber Intrusions are mandatory for Australian Government agencies as of April 2013.

Strategies to Mitigate Targeted Cyber Intrusions

Top 4 Strategies

Additional information

Examples

Contacts

  • Australian government customers with questions regarding this advice can contact ASD Advice and Assistance
  • Australian businesses and other private sector organisations seeking further information should contact CERT Australia