Cyber Security

Luke Hally

Blog

Join me as I undertake my Masters of Cyber Security

Latest Posts

Cybersecurity foundations

Learning from others

This week we were tasked with investigating how an engineering problem was solved in another discipline. For my engineering problem, I’ve chosen the dome of

Read More »
Cybersecurity foundations

Shift Security Left

Shifting Security Left is a paradigm that encourages a proactive, rather than reactive – approach to security. The term is in reference to the software

Read More »
Cybersecurity foundations

Data lakes

A data lake is a lot of data. Lots of pieces of useless information, all floating around made useful by proximity and manipulation. As security

Read More »
Cybersecurity foundations

State Surveillance

Not many people like the idea of state surveillance. But first we need to recognise that surveillance can have good and bad aspects – it

Read More »
Cybersecurity foundations

One time pad

A one time pad is what’s known as a perfect cipher. Without the key it is uncrackable and can’t be brute forced. The penny dropped

Read More »
Cybersecurity foundations

Identity Theft

Identity theft is a major problem. It occurs when criminals collect enough of your personal information to convince people that they are you. What sort

Read More »
Cybersecurity foundations

Website trackers

Data hungry website We all know that websites are tracking us all of the time, as I mentioned the data tracking economy when I explored

Read More »
Cybersecurity foundations

Password management

Considering what I have learnt this week (in this post), I’ve decided it’s time to cast a critical eye over my own password management practices.

Read More »
Cybersecurity foundations

About passwords

How do people treat passwords? The Avast report about Americans and passwords makes for disturbing reading. https://press.avast.com/83-of-americans-are-using-weak-passwords  Many Americans use personal information such as partner’s

Read More »
Cybersecurity foundations

Brute force and time

What is the longest it would take someone to brute force a password based on certain criteria? The worst case for the hacker? I’ve wondered

Read More »