Background
Australian universities have been frequent targets of cyberattacks due to their valuable research data and intellectual property.
Tasks
* Select three cybersecurity incidents involving Australian universities.
* For each incident, analyze:
* Date & context of the attack
* Attack vector used (e.g., phishing, malware, insider threats)
* Tactics, Techniques, and Procedures (TTPs) using