Public Education Around Cyber Security

Australia’s Prime Minister Malcolm Turnbull recently raised the issue of cyber security education during a Washington D.C. speech. The intention behind such a sentiment is a good one. Teaching cyber security to the public, and making it a part of the education curriculum is essentially a public safety lesson akin to ‘Don’t Do Drugs,’ ‘Don’t Talk To Strangers’, and ‘Be Alert And Aware Of Your Surroundings.’

However, as a society we are at a crossroads where our children have vastly more knowledge of the cyber landscape than adults. Teachers still struggle with computer basics while students are hacking the schools’ computer systems to change their grades, create DDoS attacks on the day of critical testing, and worse.

If the Australian government wishes to be effecting in a public safety education campaign around the risks of cyber-attack, they must first both educate and protect themselves from such possibilities.  Education must begin internally before it can be successful externally.  To do otherwise will feel like whitewash and just invite new hackers to attack the government with more frequency and fervor.

Group of computer neatly placed in a computer lab.

[You might also like: School Networks Getting Hacked – Is It the Students’ Fault?]

Here are some layman’s explanations of the various cyber-attacks:

  • DDoS:  Denial of Service attack. As the prime minister stated, “equivalent to having a bus block a driveway so a car can’t get out, while a hack means someone breaking into a garage and stealing the car.”
  • Encrypted Attack: an encrypted attack as a thief posing as a family member breaking into your house and stealing your jewelry
  • Ransomware is like having all your data (phone, computer, all your records, everything digital) kidnapped and held for ransom.
  • DDoS for Ransom Is when someone tells a business to ‘pay up or else’ we will take your digital presence offline.
  • SQL Injection: Like someone breaking into the bank and stealing all its customers’ safe deposit boxes

These are just a few of the ‘new vector’ complex cyber-attack methodologies. Until businesses and Government become fully educated and protect themselves against such attacks then incidents such as the recent Census attack will be all too frequent. To learn more about how to protect yourself, check out our blog “5 Recipes for How to Design a Resilient Cyber-Attack Environment.


Download Radware’s DDoS Handbook to get expert advice, actionable tools and tips to help detect and stop DDoS attacks.

Download Now

Paul Coates

Paul has over 30 years’ experience in Business Management and Leadership roles in the IT Technology and telecoms sector working extensively in Europe, Africa and Asia. Based in Thailand, he is now responsible for leading Radware’s business in Southern APAC (Australia & New Zealand, ASEAN and India). Previous to Radware Paul was Vice President APAC Channels at Riverbed Technology and before that, VP Sales for Northern Europe and Africa. He held leadership roles at F5 and Foundry Networks (now Brocade Communications).

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program


An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Security Research Center