Secure/Multipurpose Internet Mail Extension
Secure/Multipurpose Internet Mail Extension
A web browser developed by Apple that is the default browser in Apple devices.
A worldwide event led by the Office of the eSafety Commissioner, of which the Australian Cyber Security Centre (ACSC) is a partner.
A South Korean multinational electronics company. Samsung produces LCD and LED panels, mobile phones, memory chips, NAND flash memory, solid state drives, televisions, digital cinema screens and laptops.
A virtual space in which new, untrusted or untested software or coding can be run safely without risking harm to the hosting computer.
Supervisory Control and Data Acquisition
A fraudulent scheme performed by a dishonest or deceitful individual, group or company in an attempt to obtain money or something else of value.
An email that intentionally deceives for personal gain or to damage another individual.
A person who commits fraud or participates in a dishonest scheme.
An Australian Competition and Consumer Commission (ACCC) service that provides information to consumers and small businesses about how to recognise, avoid and report scams.
Security Construction and Equipment Committee
A type of malware written using a scripting language. Common forms of scripting language include JavaScript, HTML, Visual Basic Script, PowerShell, Perl, Python and Shell Scripting.
A derisive term used to describe an unskilled individual that uses existing computer scripts or programs to hack computers, networks or websites, lacking the expertise to write their own.
The process of increasing website traffic by increasing the visibility or ranking of a website or a web page to users of a search engine.
The people who are the second most likely to purchase products and services, and are thus targeted for marketing purposes.
A representative of a foreign government on exchange or long-term posting.
An area that has been authorised to process, store or communicate SECRET information. Such areas are not necessarily tied to a specific level of security zone.
A network protocol that can be used to securely log into, execute commands on, and transfer files between remote workstations and servers.
A networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
A protocol which allows the encryption and signing of email messages.
An area certified to the physical security requirements for a Zone 2 to Zone 5 area, as defined in the Australian Government Protective Security Policy Framework (PSPF), to allow for the processing or storage of sensitive or classified information.
An activity undertaken to assess security controls for a system and its environment to determine if they have been implemented correctly and are operating as intended.
A collection of connection-specific parameters containing information about a one-way connection in Internet Protocol security (IPsec) that is required for each protocol used.
The duration security association information is valid for.
An act that leads to damage of a system or unauthorised access to the system.
Small Business Guide Security Configuration Guide
An Australian Government interdepartmental committee responsible for the evaluation and endorsement of security equipment and services. The committee is chaired by the Australian Security Intelligence Organisation (ASIO).
A system or collection of systems operating under a consistent security policy that defines the classification, releasability and special handling caveats for information processed within the domain.
A weakness in a system that gives a threat agent the opportunity to mount an attack.
The process of securing a system by reducing its surface of vulnerability.
The level of security risk to which a system is exposed. A system with a strong security posture is exposed to a low level of security risk while a system with a weak security posture is exposed to a high level of security risk.
Any event that could result in the compromise, loss of integrity or unavailability of information or resources, or deliberate harm to people measured in terms of its likelihood and consequences.
Statements that communicate the expectations of an organisation’s senior management about the organisation’s security risk tolerance. These criteria help an organisation identify security risks and prepare appropriate treatments and provide a benchmark against which the success of mitigations can be measured.
The process of identifying, assessing and taking steps to reduce security risks to an acceptable level.
An artefact of Common Criteria evaluations that specifies conformance claims, threats and assumptions, security objectives, and security requirements for an evaluated product.
Information on how to be secure online.
Updates to the security on your system.
A weakness in a system’s security requirements, design, implementation or operation that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
Security Equipment Guide
Any device or system that has the ability to perceive that it is not operating correctly and to make the necessary adjustments to restore itself to normal operation.
The act or process of selling goods, products or services online via an internet or mobile app, auction site, online classified advertisement, online store, social networking, social media or web shop.
An email authentication method designed to detect forged sender addresses during the delivery of email.
Search Engine Optimisation
A computer that provides services to users or other systems. For example, a file server, email server or database server.
A company which allows its subscribers access to the internet.
The name given to identify a particular Wi-Fi network. The SSID is broadcast by the wireless access point (wireless router) and can be detected by other wireless-enabled devices in range of the wireless access point (WAP). In some cases, SSIDs are hidden, making them invisible to Wi-Fi clients.
A form of blackmail in which sexual information or images are used to extort money or sexual favours from the victim in return for not releasing the information or images publicly.
Secure Hashing Algorithm 1
Secure Hashing Algorithm 2
A facility where the facility and personnel are cleared at different levels.
A facility where the facility is shared by government organisations and non-government organisations.
The program that gives your commands to your computer's operating system.
A text messaging service component of most telephone, internet and mobile device systems. It uses standardised communication protocols to enable mobile devices to exchange short text messages.
A distinct pattern in network traffic that can be identified to a specific tool or exploit. Signatures are used by security software to determine if a file has been previously determined to be malicious or not.
Session Initiation Protocol
The theft of credit card information using card readers, or skimmers, to record and store victims' data.
A telecommunications application that specialises in providing video chat and voice calls between devices over the internet.
Stateless Address Autoconfiguration
A legally independent company with less than a certain number of employees or financial turnover. The Australian Taxation Office defines Australian SMEs as having less than $250 million turnover.
An Australian Cyber Security Centre (ACSC) publication series for small businesses on cyber security.
Appliances that are able to connect to the internet via Wi-Fi or another protocol such as the Zigbee specification and can be accessed and controlled remotely from any internet-connected computer or mobile device.
An electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, Zigbee, NFC, Wi-Fi, LiFi, 3G, etc, that can operate to some extent interactively and autonomously.
Vehicles equipped with system driven forms of artificial intelligence.
A handheld electronic device that provides connection to a cellular network. Smartphones allow people to make phone calls, send text messages and access the internet.
Subject Matter Expert, Small and Medium Enterprises
Short Message Service
A fraudulent text message sent by a deceitful or dishonest person in order to obtain money or something else of value.
Simple Network Management Protocol
A free open source network intrusion detection system and intrusion prevention system created by Sourcefire and now developed by Cisco.
The methods used to manipulate people into carrying out specific actions, or divulging information.
Websites and applications that enable users to create and share content or to participate in social networking.
An act of deception and fraud committed through social media websites or applications.
Standard Operating Environment
An application that allows a workstation to act as a phone using a built-in or externally-connected microphone and speaker.
A collection of data or instructions that tell a computer how to work.
An element of a system such as a database, operating system, network or web application.
A download for an application, operating system or software suite that provides fixes for features that aren't working as intended or adds minor software enhancements and compatibility.
Bugs in software. Bugs are coding errors that cause the system to make or allow an unwanted action.
Non-volatile media that uses flash memory media to retain its information when power is removed and, unlike non-volatile magnetic media, contains no moving parts.
Special Publication
Unsolicited electronic messages, especially containing advertising, indiscriminately transmitted to a large number of people.
A form of phishing that targets a specific person or group.
Sender Policy Framework
Functionality that allows personnel to access both public network infrastructure and a Virtual Private Network (VPN) connection at the same time, such as an organisation’s system and the internet.
An American multinational corporation that produces software for searching, monitoring and analysing machine-generated data via a web-style interface.
A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
An event to teach people how to navigate around the internet and be able to differentiate legitimate websites and individuals from scammers.
A program that collects information on the user’s activities without their consent. Spyware may be installed on a system illegitimately, or as a part of other software without the user’s knowledge.
Structured Query Language
Exploitation of a vulnerability in a database application that does not properly validate or encode user input, allowing the manipulation, exfiltration or deletion of data.
Solid State Drive
Secure Shell
Service Set Identifier
Secure Sockets Layer
A standardised build of an operating system and associated software that can be used for servers, workstations, laptops and mobile devices.
Instructions for following a defined set of activities in a specific manner. For example, an approved data transfer process.
A user who can, with their normal privileges, make only limited changes to a system and generally cannot bypass security measures.
A private actor that conducts activity on behalf of a state, for example, a contracted hacker or company.
Protecting yourself from any danger.
Guides developed by the Australian Cyber Security Centre to help individuals stay secure online.
A depiction of an event through people, place, and plot and brings emotional context into the portrayal of what happened.
A term used to describe an effective password (or passphrase) that is difficult to break.
A special-purpose programming language designed for managing data held in a relational database management system.
An individual or a business that signs a contract to perform part or all of the obligations of another's contract.
A person who is an authority in a particular area or topic. In computer science, also called a domain expert.
A cable laid on the sea bed between land-based stations to carry telecommunication signals across stretches of sea and ocean.
A control system architecture comprising computers, networked data communications and graphical user interfaces for high-level process supervisory management. It also comprises other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers used to interface with process plant or machinery.
A system of organisations, people, activities, information, and resources involved in supplying a product or service to a consumer.
The act of browsing the internet by going from one web page to another web page using hyperlinks in a web browser.
An online survey is a questionnaire that the target audience can complete over the internet. Online surveys are usually created as web forms with a database to store the answers and statistical software to provide analytics.
An email that is potentially malicious.
A message that is potentially malicious.
A video that is potentially malicious.
A leading software company in internet security technology.
A related set of hardware and software used for the processing, storage or communication of information and the governance framework in which it operates.
System administration refers to the management of one or more hardware and software systems. Also referred to as 'sys admin'.
The classification of a system is the highest classification of information which the system is authorised to store, process or communicate.
Critical infrastructure or essential service
The executive responsible for a system.
A document that describes a system and its associated security controls.