Identity and Access Management, also called Identity Management (IdM).
Industrial Control System
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), which is part of the US Cybersecurity and Infrastructure Security Agency (CISA).
Information and Communications Technology
Any device that can process, store or communicate electronic information (e.g. computers, multifunction devices, mobile phones, digital cameras, electronic storage media and other radio devices).
A related set of hardware and software used for processing, storing or communicating information, as well as the governance framework in which it operates.
Australia and New Zealand’s national identity and cyber support service. IDCARE offers free phone consultations and advice from specialised identity and cyber security counsellors.
The process of analysing the access of individuals or systems to an organisation's IT resources.
The process used in businesses and organisations to grant or deny employees and others authorisation to secure systems. Also known as Identity and Access Management (IAM).
When a victim’s personal details are stolen and used to perpetrate crime, commonly fraud. Identity theft is a serious crime and can result in long-term and far-reaching negative consequences for victims.
Identity Management, also known as Identity and Access Management (IAM)
Internet Engineering Task Force
Internet Key Exchange
Emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.
A scam where a dishonest individual will try to convince you to make a payment or give personal or financial details by claiming to be from a trusted organisation.
Malware operating on the internet that infects and affects users' computers. This is opposed to malware seen only in internal test environments or malware collections.
An event that is not part of normal operations that disrupts operational processes.
A plan for responding to cyber security incidents.
Control systems and associated instrumentation used to efficiently operate and/or automate industrial processes. Industrial Control Systems include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC).
An extensible term for information technology that stresses the role of unified communications and the integration of telecommunications and computers, as well as related enterprise software, middleware, storage and audio-visual systems, that enable users to access, store, transmit and manipulate information.
Any device that can process, store or communicate electronic information—for example, computers, multifunction devices and copiers, landline and mobile phones, digital cameras, electronic storage media and other radio devices.
The protection of information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability.
An Australian Cyber Security Centre publication outlining a cyber security framework that organisations can apply, using their risk management framework, to protect their systems and data from cyber threats.
An ACSC program that registers suitably qualified individuals to carry out security assessments for systems.
Devices such as mice, keyboards and pointing devices that have an infrared communications capability.
An American photo and video sharing social networking service owned by Facebook.
The process of establishing the update into the system.
The assurance that information has been created, amended or deleted only by authorised individuals.
The property of your mind or proprietary knowledge. It can be an invention, trade mark, design, brand or the application of your idea.
The back and forth dialog between the user and the computer.
The process of optimising your website so that search engines can easily identify which countries you want to target and which languages you use for business.
A specialised agency of the United Nations that is responsible for issues that concern information and communication technologies. It is the oldest global international organisation. Originally called the International Telegraph Union.
Travel outside of Australia.
The global system of interconnected computer networks that use standardised communication protocols to link devices and provide a variety of information and communication facilities.
A series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems for many years.
The network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors and network connectivity, which enables these objects to connect to the internet and collect and exchange data.
A suite of protocols for secure communications through authentication or encryption of Internet Protocol (IP) packets as well as including protocols for cryptographic key establishment.
The transport of telephone calls over IP networks.
A protocol used for communicating over packet switched networks. Version 6 is the successor to version 4 which is widely used on the internet.
A protocol that offers optimal security using six packets to establish an IPsec connection.
A protocol that uses half the exchanges of main mode to establish an IPsec connection.
A company that provides subscribers with access to the internet.
An automated system used to identify an infringement of security policy. IDS can be host-based or network-based.
Internet of Things
A code made up of a string of numbers that identifies a particular computer or device on the internet. Every computer requires an IP address to connect to the internet. Also known as an 'IP number' or simply an 'IP', short for Internet Protocol.
Internet Protocol Security
Internet Protocol version 4
Internet Protocol version 6
Information Security Registered Assessors Program
Internet Security Association Key Management Protocol
Australian Government Information Security Manual
International Organisation for Standardisation
Internet Service Provider
International Telecommunications Union
A family of all-in-one desktop computers designed and built by Apple Inc.
A mobile device operating system created and developed by Apple exclusively for its hardware. It is the operating system that presently powers many of the company's mobile devices, including the iPhone and iPod Touch; it also powered the iPad prior to the introduction of iPadOS in 2019. Originally called iPhone OS.
A line of tablet computers designed, developed and marketed by Apple Inc.
An operating system developed by Apple for the iPad family of devices.
A phone made by Apple that combines a computer, media player, digital camera and cellular phone into one device with a touchscreen interface.
A line of portable media players and multi-purpose pocket computers designed and marketed by Apple Inc.
A media player, media library, internet radio broadcaster, mobile device management utility and the client app for the iTunes Store, developed by Apple. It is used to purchase, play, download and organise digital multimedia.
A video-on-demand and catch-up TV service run by the Australian Broadcasting Corporation (ABC).