Cyber Security

Luke Hally

Blog

Join me as I undertake my Masters of Cyber Security

Latest Posts

Cybersecurity foundations

Brute force and time

What is the longest it would take someone to brute force a password based on certain criteria? The worst case for the hacker? I’ve wondered

Read More »
Cybersecurity foundations

classical ciphers

This week we looked at classical ciphers. I enjoyed this, looking at the ingenious ways that clever people have come up with hiding messages in

Read More »
Cybersecurity foundations

Unshredding a document

This week we were challenged to physically destroy some data. I’ve chosen to unshred a document. Not a special document , just some junk mail

Read More »
Cybersecurity foundations

Secrets

The problems with secrets Secrets are interesting. People want to keep secrets, people want to find secrets, people want to share them. They are important

Read More »
Cybersecurity foundations

Spot the Insider

For an activity this we were tasked with finding an example of an insider attack. An insider attack could be carried out by a true

Read More »
Cybersecurity foundations

Directors liable for cyber attacks

According to The Age, the government is considering making company directors liable for cyber attacks. With cyber crime costing Australia around $3.5 billion a year,

Read More »
Cybersecurity foundations

WA Police loopholing check in data

While learning about patterns in security, a recent news story came to mind when scope creep was mentioned -specifically systems and data being created or

Read More »
Cybersecurity foundations

The Essential Eight

Introduction Want to know how to protect yourself and limit the damage caused by a cyber attack? The Essential Eight was released by the Australian

Read More »