Cyber Security

Luke Hally

Blog

Join me as I undertake my Masters of Cyber Security

Latest Posts

Security engineering

Social engineering hack

“ Social engineering is an extremely effective technique used by hackers worldwide to compromise internal systems and proprietary information assets. In fact, it’s one of

Read More »
Security engineering

CIA’s peddle power

I’ve had a couple of opportunities to apply what I have learnt in the real world this week. Estimating Attacker Power This degree has affected

Read More »
Security engineering

What is Authentication

Authentication is proving who you are. Not to be confused with authorisation, which is having permission to access or use something. In security we often

Read More »
Security engineering

Bitcoin and blockchain

Thanks to my involvement in fintech, I’ve been around the edges of bitcoin and blockchain for a while Traditional money relies on a trusted third

Read More »
Security engineering

Hash definitions and attacks

There’s a lot to remember about hashes, so I’m bringing the definitions into one place as a reference. Term Definition Avalanche effect Small changes in

Read More »
Security engineering

Block Modes

DES (Data Encryption Standard) and AES (Advance Encryption Standard) are both block ciphers. The message is broken into blocks and each block is encrypted and

Read More »
Security engineering

Error Types

What are type I and type II errors? They sound fancy but are quite simple to understand and are a good way to look at

Read More »
Security engineering

Hashes and Cryptographic Hashes

Encryption is the glamourous part of confidentiality, today we will look at hashes. We’ll cover regular and cryptographic hashes, a bit of history then we’ll

Read More »