A popular free social networking website that allows registered users to create profiles, upload photos and videos, send messages and keep in touch with friends, family and colleagues.
An Apple video telephony application that allows users to engage in one-on-one video chat over the internet.
A physical space where business is performed. For example, a facility can be a building, a floor of a building or a designated space on the floor of a building.
Sending counterfeit email by using a legitimate sender's address without their knowledge.
A trader that is in not legitimate.
Twitter accounts that are not legitimate.
Websites that are not legitimate.
A device that allows copies of documents to be sent over a telephone network.
A particularly lightweight thread of execution. Like threads, fibres share address space. However, fibres use cooperative multitasking while threads use pre-emptive multitasking.
Federal Information Processing Standard
A free and open source web browser developed by the Mozilla Foundation.
A network device that filters incoming and outgoing network data based on a series of rules.
Software embedded in ICT equipment.
An Anglophone intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States of America.
A specific type of electrically erasable programmable read-only memory.
Computer software for using content created with Adobe Flash, including viewing multimedia content, executing rich internet applications, and streaming audio and video.
A defect, fault or imperfection, especially one that is hidden or unknown.
A lead that connects ICT equipment to the fixed infrastructure of a facility. For example, the lead that connects a workstation to a network wall socket.
A person who is not an Australian citizen.
A system that is not solely owned and managed by the Australian Government.
Intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.
When multiple organisations promote anti-fraud awareness and education to minimise the impact of fraud.
A method used to discover errors or potential security vulnerabilities in software. Also called 'fuzz testing'.