Cyber Threats Report


Given the popularity and convenience of online services, many organizations, including government entities, have opted to transition to these

platforms. However, these services come with significant risks, particularly exposure to cyberattacks. These attacks exploit vulnerabilities, often

resulting from the creativity of hackers who identify and exploit weaknesses. Nevertheless, many of these vulnerabilities can be addressed by

implementing governance frameworks and security policies discussed during lectures.

This task requires analyzing three recent cyberattacks that have occurred in Australia and providing a comprehensive comparison of these

incidents. To accomplish this, you can utilize various news sources such as Select three recent attacks and

compile a report containing the following criteria for each threat or attack:

  1. Introduction (3 marks)
  2. Description of the threat/attack (3 marks)
  3. Except Australia, what are the other locations where the same threat/attack has occurred globally (2 marks)
  4. Causes of the threat/attack (3 marks)
  5. Vulnerabilities exploited by the threat/attack (4 marks)
  6. Assets targeted and compromised by the threat/attack (3 marks)
  7. Mitigation techniques employed by the victims (2 marks)
  8. Assessment of losses incurred (2 marks)
  9. Personal reflections on the attacks. (3 marks)

You can present this information in a creative format, such as a table, to enhance readability and clarity. The report must be within 1000-1500 words.