Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark Branagan is active.

Publication


Featured researches published by Mark Branagan.


hawaii international conference on system sciences | 2013

A Proposed Australian Industrial Control System Security Curriculum

Ernest Foo; Mark Branagan; Thomas H. Morris

The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.


International Journal of Risk Assessment and Management | 2007

Intelligence and anticipation: issues in security, risk and crisis management

Paul H. Barnes; Michael B. Charles; Mark Branagan; Alistair Knight

This article deals with the way in which intelligence flows and other critical information can be embedded into a risk framework that will facilitate the early warning of emerging threat scenarios. That is, an organisation should be able to anticipate crisis triggers and know when a crisis situation will manifest itself. As an outcome, a conceptual framework that defines how to make sense of complex situations, datasets and real world anomalies is suggested.


information security | 2008

Feasibility of Automated Information Security Compliance Auditing

Dennis Longley; Mark Branagan; William J. Caelli; Lam For Kwok

According to AS/NZS ISO/IEC 27001:2006 [11], management of an organization should provide evidence of its commitment to the establishment, implementation, operation, monitoring, review, maintenance and improvement of the organization’s information security management system. The objective of this research project was to explore the feasibility of designing an intelligent documentation system to assist information security managers in meeting this commitment. In particular, this documentation system would assist in the associated tasks of risk assessment and information security compliance auditing. The proposed documentation system, comprising both supporting software and a database model of the organizational information security environment, together with formalized compliance requirements, may be used both for automated and ongoing compliance testing as well as risk assessment. The risk assessment aspect of the documentation system has been described in previous papers [3, 14]. This paper will deal with a feasibility study of automated compliance auditing. Such automated compliance auditing would enable security managers to readily benchmark their current systems against the appropriate information security standards. This study was undertaken to specifically explore the feasibility of automated compliance auditing against an international information security standard. The standard originally selected for the study was AS/NZS ISO/IEC 17799:2001) [9]


Institute for Future Environments; Science & Engineering Faculty | 2014

Poisoned GOOSE : exploiting the GOOSE protocol

Nishchal Kush; Mark Branagan; Ernest Foo; Ejaz Ahmed


Faculty of Science and Technology; Information Security Institute | 2006

Security Risk Analysis for Complex Systems

Mark Branagan; Robert Dawson; Dennis Longley


information security conference | 2014

Poisoned GOOSE: exploiting the GOOSE protocol

Nishchal Kush; Ejaz Ahmed; Mark Branagan; Ernest Foo


information security for south africa | 2005

Developing Threat Networks for Risk Analysis of Information Systems.

Dennis Longley; Mark Branagan


Information Security Institute | 2007

Forensic challenges in service oriented architectures

Andrew Marrington; Mark Branagan; Jason Smith


Science & Engineering Faculty | 2013

A proposed Australian industrial control system security curriculum

Ernest Foo; Mark Branagan; Thomas H. Morris


Faculty of Science and Technology; Information Security Institute | 2012

A risk simulation framework for information infrastructure protection

Mark Branagan

Collaboration


Dive into the Mark Branagan's collaboration.

Top Co-Authors

Avatar

Dennis Longley

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ernest Foo

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ejaz Ahmed

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Nishchal Kush

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

William J. Caelli

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lam For Kwok

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Thomas H. Morris

Mississippi State University

View shared research outputs
Top Co-Authors

Avatar

Andrew Marrington

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jason Smith

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge