Skip main navigation

Learning online with Deakin

Deakin’s online courses are based on a few, but important, learning principles. To get the most out of this course, we encourage you to keep in mind the following. Our …

Protection and privacy online

Using everyday online services and social media sites can lead to your private information being at risk. Most of us want to keep the convenience and benefits of doing business …

Protecting your system – password management

Even though we know the importance of passwords, many of us don’t change them regularly and continue to use passwords like ‘password’ or ‘123456’. This article from the Entrepreneur covering …

Protecting your system – encryption

Encryption is the process of converting a file into a format where it can only be decrypted or accessed by a person who has the correct key. Encryption doesn’t stop …

A cyber hacker’s toolkit: reconnaissance

The best way to understand how a cyber attack occurs is to see one in action. In this video, Dr Nick Patterson demonstrates the back-end mechanics of how attacks like …

A cyber hacker’s toolkit: exploitation

Once a weakness is found, it can be exploited. In this video, Dr Nick Patterson continues to demonstrate the back-end mechanics of an attack such as the Panama Papers hack. …

A cyber hacker’s toolkit: hiding

After a cyber attack, there will be traces of the activity in the system log files. These need to be removed to hide the attack. After accessing your system, a …

More than data: the true cost of cyber attacks

When cyber attacks occur, they can have a variety of costly (and potentially devastating) consequences. Fifty years ago, organisations did not conduct business on the internet. Now, millions of people …

Zero-day vulnerabilities

According to technology security specialist Symantec, a new zero-day vulnerability was discovered every week in 2015. A zero-day vulnerability refers to a hole in new software or operating systems that …