Background Australian universities have been frequent targets of cyberattacks due to their valuable research data and intellectual property. Tasks Select three cybersecurity incidents involving Australian universities. For each incident, analyze: Date & context of the attack Attack vector used (e.g., phishing, malware, insider threats) Tactics, Techniques, and Procedures (TTPs) using MITRE ATT&CK framework Step-by-step attack execution Damages caused (data breaches, financial loss, reputational impact) Prevention […]




