Media Access Control
Media Access Control
Apple's third laptop computer family. MacBooks featured Apple's Retina Display and higher resolutions, as well as the Force Touch trackpad that senses different pressure levels.
A type of artificial intelligence (AI) that allows software applications to become more accurate in predicting outcomes without being explicitly programmed. The basic premise of machine learning is to build algorithms that can receive input data and use statistical analysis to predict an output value within an acceptable range.
The Macintosh computer (often referred to as the Mac) is a desktop computer by Apple that comes in a variety of form factors and designs. The Macintosh was the first affordable and successful computer packed with a graphical user interface and mouse, although technically, Apple's Lisa was the first commercial computer that included these components.
An instruction that causes the execution of a predefined sequence of instructions.
Intending or intended to do harm.
Individual or organisations that conduct malicious activities, such as cyber espionage, cyber attacks or cyber-enabled crime.
The use of online advertising to spread malware. It typically involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and web pages.
Any software that attempts to subvert the confidentiality, integrity or availability of a system.
The occurrence of malicious code infecting a system.
An email which has been deliberately crafted to cause problems on the server or on the client. This could be by making the message contain a virus, or crafting the message in such a way as to take advantage of a weakness in the receiving mail client.
People who take advantage of their access to inflict harm on an organisation.
A malicious link is created with the purpose of promoting scams, attacks and frauds. By clicking on an infected URL, you can download malware such as a Trojan or virus that can take control of your devices, or you can be persuaded to provide sensitive information on a fake website.
Any software that brings harm to a computer system. Malware can be in the form of worms, viruses, Trojans, spyware, adware and rootkits etc which steal protected data, delete documents or add software not approved by a user.
The use of online advertising to spread malware. Malvertising involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Malicious software used to gain unauthorised access to computers, steal information and disrupt or disable networks. Types of malware include Trojans, viruses and worms.
A company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.
Traffic generated by system administrators over a network in order to control workstations and servers. This includes standard management protocols and traffic that contains information relating to the management of the network.
A conceptual model that consists of a sequence of discrete maturity levels for a class of processes in one or more business domains, and represents an anticipated, desired or typical evolutionary path for these processes.
A generic term for hardware, often portable in nature, which is used to store information.
The process of physically damaging media with the intent of making information stored on it inaccessible. To destroy media effectively, only the actual material in which information is stored needs to be destroyed.
The process of relinquishing control of media when it is no longer required.
A document or statement that is sent to news outlets or journalists to inform them about a story that an individual wants media coverage for.
The process of erasing or overwriting information stored on media so that it cannot be retrieved or reconstructed.
Commonly refers to an American messaging app and platform developed by Facebook. Microsoft and Yahoo also offered software named Messenger.
Descriptive information about the content and context used to identify information.
An American multinational corporation that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services.
A family of client software, server software and services developed by Microsoft.
A service available to help you with questions about Microsoft products and services.
A series of graphical interface operating systems developed, marketed and sold by Microsoft.
Moving data or applications between two different computers.
Multiple-input and multiple-output
A transmission and reception station in a fixed location, consisting of one or more receive/transmit antenna, microwave dish and electronic circuitry, used to handle cellular traffic.
A portable computing or communications device. For example, a laptop, mobile phone or tablet.
A wireless handheld device that allows users to make and receive phone calls and to send text messages, among other features.
A software community that uses, develops, spreads and supports Mozilla products, notably the Firefox web browser.
Managed Service Provider
A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are).
ICT equipment that combines printing, scanning, copying, faxing or voice messaging functionality in the one device. These devices are often designed to connect to computer and telephone networks simultaneously.
A short Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) guide to help people put in place some good online security habits to prevent them falling victim to scammers.
Mini-Serial Advanced Technology Attachment