Skip to main content



ASD Approved Cryptographic Algorithm


ASD Approved Cryptographic Protocol


Australian Bureau of Statistics


Australasian Certification Authority

Academic Centres of Cyber Security Excellence

The Academic Centres of Cyber Security Excellence (ACCSE) program is part of Australia's $230 million Cyber Security Strategy launched by the Prime Minister on 21 April 2016.


Australian Competition and Consumer Commission

Access control

The process of granting or denying requests for access to systems, applications and information. Can also refer to the process of granting or denying requests for access to facilities.

Access Cross Domain Solution

A system permitting access to multiple security domains from a single client device.

Account harvesting

The illegal practice of collecting email accounts from information in the public domain or by using software to search for email addresses stored locally on a computer. Account harvesting may be used for spamming.


Academic Centres of Cyber Security Excellence


ASD Cryptographic Evaluation


Australian Communication Exchange Limited


Australian Criminal Intelligence Commission


Australian Communications and Media Authority


Australian Cybercrime Online Reporting Network (replaced by ReportCyber)


Adobe Acrobat is software to view, create, edit and manage PDF files


Australian Cyber Security Centre


Australian Communications Security Instruction

Active defence

The principle of proactively implementing a spectrum of security measures to strengthen a network or system to make it more robust against attack. Active defence is separate from offensive cyber operations, as well as passive defence or network hardening.

Note: some references to active defence focus on the employment of limited offensive action and counterattacks – commonly referred to as ‘hacking back’. The term active defence is not synonymous with ‘hacking back’, and should not be used interchangeably.

Ad blockers

An ad blocker is software that prevents advertisements from appearing with the content the user is intentionally viewing. People block ads for a variety of reasons. For example, many of them find marketing ads annoying and even stressful.


Australian Data and Digital Council


Adobe Inc, known until 3 October 2018 as Adobe Systems Incorporated, is an American multinational computer software company headquartered in San Jose, California.

Adobe Flash Player

Adobe Flash Player is computer software for using content created on the Adobe Flash platform, including viewing multimedia contents, executing rich Internet applications, and streaming audio and video

Adobe Reader

Adobe Reader is a free program created and distributed by Adobe Systems. It is used to open PDF documents. PDFs can be a wide variety of files, such as images, text documents, forms, books, or any combination of these. They are cross-platform, meaning each PDF will look the same on a Windows computer as it will on a Mac.

Advanced Persistent Threat

A label given to a set of malicious cyber activity with common characteristics, often orchestrated by a person or persons targeting specific entities over an extended period. An APT usually targets either private organisations, states or both for business or political motives.


An opinion recommending a course of action to be taken given the circumstances relating to a single moment or decision.


Advisories provide timely information and advice about current security issues, vulnerabilities, and exploits.


A program that displays advertisements that can be installed legitimately as a part of another application or service, or illegitimately without the consent of the system user.


Advanced Encryption Standard


Australian Federal Police

After market devices

A secondary market of an industry, concerned with the manufacturing, remanufacturing, distribution, retailing, and installation of all parts, equipment, and accessories, after the sale of the device by the original equipment manufacturer to the consumer.


Australian Government Access Only


Attorney-General's Department

Aggregation (of data)

A term used to describe compilations of information that may require a higher level of protection than their component parts.


Authentication Header

Air Gap

A network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.


AirPort Express, AirPort Extreme (Wi-Fi) and AirPort Time Capsule (Wi-Fi HDD).


Australasian Information Security Evaluation Facility


Australasian Information Security Evaluation Program


Australian Internet Security Initiative


An alert is intended to provide timely notification concerning threats or activity with the potential to impact individuals, businesses, organisations, government, devices, peripherals, networks or infrastructure.

Amazon Inc is an American multinational technology company based in Seattle, focusing on e-commerce, cloud computing, digital streaming and artificial intelligence.

Amazon Web Services

Amazon Web Services is a comprehensive, evolving cloud computing platform provided by Amazon that includes a mixture of infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service (SaaS) offerings.


Android is a mobile operating system developed by Google. It is used by several smartphones and tablets. The Android operating system is based on the Linux kernel.


American National Standards Institute


Software that is designed to detect, stop and remove viruses and other kinds of malicious software.


Access Point




Apple, Inc. is an electronics and software company based in California, USA. Originally known as Apple Computer.

Apple ID

Apple ID is an authentication method used by Apple for iPhone, iPad, Mac and other Apple devices. Apple IDs contain user personal information and settings. When an Apple ID is used to log into an Apple device, the device will automatically use the settings associated with the Apple ID.

Apple support

Help and support service provided by Apple


Application software is a program or group of programs designed for end users. Examples of an application include a word processor, a spreadsheet, an accounting application, a web browser, an email client, a media player, a file viewer, an aeronautical flight simulator, a console game or a photo editor. The collective noun application software refers to all applications collectively. This contrasts with system software, which is mainly involved with running the computer.

Application control

An approach in which only an explicitly defined set of trusted applications are allowed to execute on systems.


Australian Prudential Regulation Authority


Advanced Persistent Threat


A place where an accumulation of computer files is stored. It could be disk storage, flash drive, a backup disk drive, an online backup service and indexing internet pages.

Artificial Intelligence

Artificial intelligence is the simulation of intelligence processes by machines, especially computer systems. These processes include learning (the acquisition of information and rules for using the information), reasoning (using the rules to reach approximate or definite conclusions), and self-correction. Particular applications of AI include threat identification, expert systems, speech recognition and machine vision.


Australian Signals Directorate

ASD Cryptographic Evaluation

A program that analyses products to determine whether their security architecture and cryptographic algorithms have been implemented correctly and are strong enough for the products intended use.


Australian Securities and Investments Commission


Australian Security Intelligence Organisation


Anything of value, such as ICT equipment, software or information.


Advanced Technology Attachment


Australian Taxation Office

Attack surface

The amount of ICT equipment and software used in a system. The greater the attack surface the greater the chances of an adversary finding an exploitable security vulnerability.


The process of assessing the source, perpetrator or sponsor of malicious activity. Statements of attribution often use probabilistic language and indicate the level of confidence in the assessment.

Audit log

A chronological record of system activities including records of system access and operations performed.

Audit trail

A chronological record that reconstructs the sequence of activities surrounding, or leading to, a specific operation, procedure or event.


Australian Eyes Only

Australasian Information Security Evaluation Facility

A program that evaluates products in order to protect systems and information against cyber threats. These evaluation activities are certified by the Australasian Certification Authority.

Australasian Information Security Evaluation Program

A program under which evaluations are performed by impartial bodies against the Common Criteria. The results of these evaluations are then certified by the Australian Cyber Security Centre (ACSC) which is responsible for the overall operation of the program.

Australasian Information Security Evaluation Program

The Australasian Information Security Evaluation Program (AISEP) evaluates products in order to protect systems and information against cyber threats. These evaluation activities are certified by the Australasian Certification Authority.

Australian Bureau of Statistics

The Australian Bureau of Statistics is the independent statistical agency of the Government of Australia. The Australian Bureau of Statistics provides key statistics on a wide range of economic, population, environmental and social issues, to assist and encourage informed decision making, research and discussion within governments and the community.

Australian Communication Exchange Limited

The charity's purpose is to provide communication assistance for the deaf and hearing-impaired community.

Australian Communications and Media Authority

The Australian Communications and Media Authority is an Australian Government statutory authority within the Communications portfolio.

Australian Competition and Consumer Commission

The Australian Competition and Consumer Commission is an independent authority of the Australian Government. Its mandate is to protect consumer rights, business rights and obligations, perform industry regulation and price monitoring and prevent illegal anti-competitive behaviour.

Australian Criminal Intelligence Commission

The Australian Criminal Intelligence Commission is a law enforcement agency established by the Australian federal government on 1 July 2016. It has specialist investigative capabilities and delivers and maintains national information sharing systems.

Australian Cyber Security Centre

The Australian Cyber Security Centre is the Australian Government lead agency for cyber security. The ACSC is part of the Australian Signals Directorate.

Australian Cybercrime Online Reporting Network

Replaced by ReportCyber

Australian Data and Digital Council

Is a department that provides high quality advice and support to the Prime Minister, the Cabinet, Portfolio Ministers and Assistant Ministers to achieve a coordinated and innovative approach to the development and implementation of Government policies. They coordinate and develop policy across the Government in economic, domestic and international issues, Aboriginal and Torres Strait Islander affairs and public service stewardship.

Australian Eyes Only information

Information not to be passed to, or accessed by, foreign nationals.

Australian Federal Police

The Australian Federal Police's role is to enforce Commonwealth criminal law, contribute to combating complex, transnational, serious and organised crime impacting Australia's national security and to protect Commonwealth interests from criminal activity in Australia and overseas.

Australian Government Access Only information

Information not to be passed to, or accessed by, foreign nationals, with the exception of seconded foreign nationals.

Australian Government Information Security Manual

The information security manual produced by the Australian Cyber Security Centre outlines a cyber security framework that organisations can apply, using their risk management framework, to protect their information and systems from cyber threats.

Australian Internet Security Initiative

The Australian Internet Security Initiative is a program run by Australian Cyber Security Centre that helps to reduce malicious software (malware) infections and service vulnerabilities occurring on Australian internet protocol address ranges. It operates as a public-private partnership where Australian internet providers voluntarily work with ACSC to help protect their customers from cyber security threats.

Australian Prudential Regulation Authority

The Australian Prudential Regulation Authority is a statutory authority of the Australian Government and the prudential regulator of the Australian financial services industry.

Australian Security Intelligence Organisation

The Australian Security Intelligence Organisation is Australia's national security agency responsible for the protection of the country and its citizens from espionage, sabotage, acts of foreign interference, politically motivated violence, attacks on the Australian defence system, and terrorism.

Australian Signals Directorate

Australian Signals Directorate is the Australian government agency responsible for foreign signals intelligence, support to military operations, cyber warfare, and information security.

Australian Signals Directorate Cryptographic Evaluation

The rigorous investigation, analysis, verification and validation of cryptographic software and equipment by ASD against a stringent security standard.

Australian Taxation Office

The Australian Taxation Office is the principal revenue collection agency of the Australian Government. Their role is to effectively manage and shape the tax and superannuation systems that support and fund services for Australians.


Verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system.

Authentication Header

A protocol used in Internet Protocol Security (IPsec) that provides data integrity and data origin authenticity but not confidentiality.

Authorising officer

An executive with the authority to formally accept the security risks associated with the operation of a system and to authorise it to operate.


The assurance that systems and information are accessible and useable by authorised entities when required.


Amazon Web Services