Radio communications is the transmission of signals by modulation of electromagnetic waves with frequencies below those of visible light.
A device designed to transmit electromagnetic radiation as part of a radio communication system.
Remote Access Dial-In User Service
Unexpected prize and lottery scams work by asking you to pay some sort of fee in order to claim your prize or winnings from a competition or lottery you never entered.
Malicious software that makes data or systems unusable until the victim makes a payment.
Remote Access Tool
Remote Desktop Protocol
An administrative decision to change the security measures afforded to information based on a reassessment of the potential impact of its unauthorised disclosure.
The lowering of the security measures for media containing sensitive or classified information often requires sanitisation or destruction processes to be undertaken prior to a formal decision to lower the security measures protecting the information.
Outlines an organisation's recovery strategy for how they are going to respond to an incident.
Redaction is a form of editing in which multiple sources of texts are combined and altered slightly to make a single document.
Information not to be passed to, or accessed by, foreign nationals beyond those belonging to specific nations which the information has been authorised for release to.
Access to a system that originates from outside an organisation’s network and enters the network through a gateway, including over the internet.
Remote access scams, are when a scammer pretends to be affiliated with a tech or computer company, such as Apple, Microsoft, or with their technical support division. The scammer usually tries to convince you that you have a computer or internet problem and you need to buy new software to fix the problem.
A software administration tool or program that can be used by a hacker to remotely gain access and control of an infected machine.
Remote desktop protocol is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection.
Storage media that can be easily removed from a system and is designed for removal, for example USB flash drives or optical media.
Various reports and statistics which are available on the cyber.gov.au website.
The capacity to recover quickly from difficulties.
Return to a former condition, place or position.
The theme for Stay Smart Online Week. Reverse the threat means to lower the statistics of the amount of cyber attacks by putting preventative measures in place to stay safe online.
Request for Comments
A type of scam involving feigning romantic intentions towards a victim, gaining their affection, and then using that goodwill to commit fraud. This may involve access to the victim's money, bank accounts, credit cards, passports, email accounts, or national identification numbers or forcing the victims to commit financial fraud on their behalf. Often called dating and romance scams.
A tool or set of tools used by an attacker in order to compromise a system, gain the highest level of privilege, and then hide their activity.
A networking device that forwards data packets between computer networks.
Originally RDF Site Summary; later, two competing approaches emerged, which used the backronyms Rich Site Summary and Really Simple Syndication respectively.
Real-time Traffic Protocol