Identity Management (IdM), also known as Identity & Access Management
Industrial Control System
Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) which is part of the Cybersecurity and Infrastructure Security Agency (CISA).
Information and Communications Technology
Any device that can process, store or communicate electronic information (e.g. computers, multifunction devices, mobile phones, digital cameras, electronic storage media and other radio devices).
A related set of hardware and software used for the processing, storage or communication of information and the governance framework in which it operates.
IDCARE is Australia and New Zealand’s national identity & cyber support service. IDCARE offer free phone consultations and advice from specialised identity and cyber security counsellors.
The process of analysing the access of individuals or systems to an organisations IT resources.
Identity and access management is the process used in businesses and organisations to grant or deny employees and others authorisation to secure systems.
Where a victim’s personal details are stolen and used to perpetrate crime – commonly fraud. Identity theft is a serious crime and can result in long term and far-reaching negative consequences for victims.
Identity Management, also known as Identity & Access Management (IAM)
Internet Engineering Task Force
Internet Key Exchange
Impersonation attacks are emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.
An impersonation scam is a scam where a dishonest individual will try to convince you to make a payment, give personal or financial details by claiming to be from a trusted organisation.
Describes malware found in operation on the internet that infects and affects users' computers. This is opposed to malware seen only in internal test environments or malware collections.
An incident is an event that is not part of normal operations that disrupts operational processes.
A plan for responding to cyber security incidents.
A collective term describing control systems and associated instrumentation used to efficiently operate and/or automate industrial processes. ICS include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC).
Information and communications technology is an extensible term for information technology that stresses the role of unified communications and the integration of telecommunications and computers, as well as necessary enterprise software, middleware, storage, and audio-visual systems, that enable users to access, store, transmit, and manipulate information.
Any device that can process, store or communicate electronic information—for example, computers, multifunction devices and copiers, landline and mobile phones, digital cameras, electronic storage media and other radio devices.
The protection of information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability.
An initiative of the ACSC designed to register suitably qualified individuals to carry out security assessments for systems.
Devices such as mice, keyboards and pointing devices that have an infrared communications capability.
Instagram is an American photo and video sharing social networking service owned by Facebook, Inc.
The process of establishing the update into the system.
The assurance that information has been created, amended or deleted only by authorised individuals.
Intellectual property is the property of your mind or proprietary knowledge.
The back and forth dialog between the user and the computer.
International SEO is the process of optimizing your website so that search engines can easily identify which countries you want to target and which languages you use for business.
The International Telecommunication Union (ITU), originally the International Telegraph Union, is a specialised agency of the United Nations that is responsible for issues that concern information and communication technologies. It is the oldest global international organisation.
Travel outside of Australia.
The global system of interconnected computer networks that use standardised communication protocols to link devices and provide a variety of information and communication facilities.
Internet Explorer is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems.
The network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to connect to the internet and collect and exchange data.
A suite of protocols for secure communications through authentication or encryption of Internet Protocol (IP) packets as well as including protocols for cryptographic key establishment.
The transport of telephone calls over IP networks.
A protocol used for communicating over packet switched networks. Version 6 is the successor to version 4 which is widely used on the internet.
A protocol that uses half the exchanges of main mode to establish an IPsec connection.
A protocol that offers optimal security using six packets to establish an IPsec connection.
A company that provides subscribers with access to the internet.
An automated system used to identify an infringement of security policy. IDS can be host-based or network-based.
Internet of Things
Also known as an “IP number” or simply an “IP”, short for Internet Protocol. A code made up of a string of numbers that identifies a particular computer on the Internet. Every computer requires an IP address to connect to the Internet.
Internet Protocol Security
Internet Protocol version 4
Internet Protocol version 6
Information Security Registered Assessors Program
Internet Security Association Key Management Protocol
Australian Government Information Security Manual
International Organisation for Standardisation
Internet Service Provider
International Telecommunications Union
iMac is a family of all-in-one Macintosh desktop computers designed and built by Apple Inc.
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that presently powers many of the company's mobile devices, including the iPhone, and iPod Touch; it also powered the iPad prior to the introduction of iPadOS in 2019.
iPad is a line of tablet computers designed, developed and marketed by Apple Inc.
iPadOS is an operating system developed by Apple for the iPad family of devices.
iPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.
The iPod is a line of portable media players and multi-purpose pocket computers designed and marketed by Apple Inc.
iTunes, developed by Apple Inc., is a media player, media library, internet radio broadcaster, mobile device management utility, and the client app for the iTunes Store.
It is used to purchase, play, download, and organise digital multimedia, on personal computers running the macOS and Windows operating systems (in 2019, Apple announced that iTunes in macOS Catalina would be replaced by separate apps, namely Music, Podcasts, and TV. Finder would take over the device management capabilities).
iView is a video on demand and catch up TV service run by the Australian Broadcasting Corporation.