A portable computer that uses a touch screen as its primary input device. Most tablets are slightly smaller and lighter than the average laptop.
A portable computer that uses a touch screen as its primary input device. Most tablets are slightly smaller and lighter than the average laptop.
When an individual or business willfully and intentionally falsifies information on a tax return to limit their tax liability.
A proprietary software application for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers.
The transfer of signals over distances.
A device that is used for point-to-point communication over a distance. This includes digital and IP telephony.
A system designed primarily for the transmission of voice communications.
A company offering software tools for web, mobile and desktop application development, and tools and subscription services for cross-platform application development.
A type of penetration tool (burp extension) used to detect and exploit versions of the Telerik web user interface that contain the CVE-2017-9248 cyber vulnerability.
An Australian telecommunications company which builds and operates telecommunications networks and markets voice, mobile, internet access, pay television and other products and services.
A short name referring to investigations and studies of compromising emanations.
ICT equipment that has been specifically designed to minimise TEMPEST emanations.
A telecommunication device that enables people who are deaf, hard of hearing or speech impaired to use the telephone system.
An entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact – an organisation's security. Also referred to as a malicious actor.
Traffic Light Protocol
Recipients can spread this to the world, there is no limit on disclosure. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction.
Transport Layer Security
An area that has been authorised to process, store or communicate TOP SECRET information. Such areas are not necessarily tied to a specific level of security zone.
A device that has been configured to automatically filter and control the flow of data.
The Traffic Light Protocol is a set of Australian Cyber Security Centre (ACSC) designations used to ensure that information is shared with the correct audience.
A system that facilitates the transfer of information, in one or multiple directions (low to high or high to low), between different security domains.
Transport layer security is a widely adopted security protocol designed to facilitate privacy and data security for communications over the internet.
An Internet Protocol security (IPsec) mode that provides a secure connection between two endpoints by encapsulating an IP payload.
A multinational cyber security and defence company with global headquarters in Japan. The company develops enterprise security software for servers, containers, and cloud computing environments, networks and end points.
A type of malware or virus disguised as legitimate software, which is used to hack into the victim's computer.
A person or system formally identified as being capable of reliably producing information meeting certain defined parameters, such as a maximum data classification and reliably reviewing information produced by others to confirm compliance with certain defined parameters.
Text telephone or telephone typewriter
A free social networking website that allows registered users to post multimedia content to their own customisable blogs.
An Internet Protocol security (IPsec) mode that provides a secure connection between two endpoints by encapsulating an entire IP packet.
An American microblogging and social networking service on which users post and interact with messages known as 'tweets'.
A form of multi-factor authentication (see definition) to confirm a user's claimed identity by combining two different pieces of evidence.