Australian universities have been frequent targets of cyberattacks due to their valuable research data and intellectual property. Tasks Select three cybersecurity incidents involving Australian universities. For each incident, analyz
Background Australian universities have been frequent targets of cyberattacks due to their valuable research data and intellectual property. Tasks Select three cybersecurity incidents involving Australian universities. For each incident, analyze: Date & context of the attack Attack vector used (e.g., phishing, malware, insider threats) Tactics, Techniques, and Procedures (TTPs) using MITRE ATT&CK framework Step-by-step attack […]