(1300 292 371)
A feature or defect of a computer system that allows access to data by bypassing normal security measures.
In information technology, a copy of computer data taken and stored elsewhere so that it may be used to restore the original after data loss.
An institution offering certain financial services, such as the safekeeping of money, conversion of domestic into and from foreign currencies, lending of money at interest, and acceptance of bills of exchange.
Large amounts of structured and unstructured data that exceeds the ability of commonly used software tools to capture, manage and process. Big data requires techniques and technologies with new forms of integration to reveal insights from datasets that are diverse, complex, and of a massive scale.
Measurable physical characteristics used to identify or verify an individual.
A digital currency and payment system underpinned by blockchain technology. Bitcoins can be used for online purchases, or converted into traditional currency.
A person that hacks for personal gain and/or who engages in illicit and unsanctioned hacking activities. See also 'grey hat' and 'white hat'.
An act of coercion using the threat of revealing or publicising either substantially true or false information about a person or group unless certain demands are met. It is often damaging information and may be revealed to family members or associates rather than to the general public.
A distributed database that maintains a continuously growing list of records, called blocks, secured from tampering and revision. Each block contains a timestamp and a link to a previous block. By design, blockchains are inherently resistant to modification of the data—once recorded, the data in a block cannot be altered retrospectively.
A list of entities that are not considered trustworthy and are blocked or denied access.
A type of security vulnerability by which hackers can leverage Bluetooth connections to penetrate and take complete control over targeted devices. BlueBorne affects ordinary computers, mobile phones, smart devices and wearable gadgets.
A vulnerability in the Remote Desktop Protocol (RDP) that can affect the Windows 7, Windows Vista, Windows XP, Server 2003 and Server 2008 operating systems.
A wireless technology standard used for exchanging data between fixed and mobile devices over short distances using short-wavelength UHF radio waves.
A fake request
A program that performs automated tasks. In a cyber security context, a malware-infected computer that carries out tasks set by someone other than the device's legitimate user.
A collection of computers infected by bots and remotely controlled by an actor to conduct malicious activities without the user's knowledge, such as to send spam, spread malware, conduct denial of service activities or steal data.
When data is lost or subjected to unauthorised access, modification, disclosure, or other misuse or interference. Also referred to as a ‘data spill’.
An incident that results in unauthorised access to data, applications, services, networks and/or devices by bypassing their underlying security mechanisms.
An organisational policy that allows employees to use their own personal devices for work purposes. These devices connect to and utilise the organisation's network, data and resources.
Wide bandwidth data transmission which transports multiple signals and traffic types. In the context of internet access, broadband is used to mean any high speed internet access that is always on.
The distribution of audio or video content to a dispersed audience via any electronic mass communications medium, but typically one using the electromagnetic spectrum.
A software application for retrieving, presenting and traversing information resources on the World Wide Web.
Occurs when browser settings are changed without the user's knowledge or consent. The browser may persistently redirect to malicious or other unwanted websites.
The list of web pages a user has visited recently — and associated data such as page title and time of visit — which is recorded by web browser software by default.
An unsophisticated and exhaustive process to try and determine a cryptographic key or password without the user's knowledge by systematically trying all alternatives or combinations until the correct one is discovered.
A flaw or error in a software program.
A loosely-defined set of planning, preparatory and related activities which are intended to ensure that an organisation's critical business functions will either continue to operate despite serious incidents or disasters that might otherwise have interrupted them, or will be recovered to an operational state within a reasonably short period.
Attacks that are a form of cybercrime which use email fraud to target business, government and non-profit organisations to achieve a specific outcome which negatively impacts the target organisation.
A dishonest scheme that aims to get money or something else of value from businesses.
A form of electronic commerce which allows consumers to directly buy goods or services from a seller over the internet using a web browser.
Bring Your Own Device
1300 CYBER1(1300 292 371)