The technical term for the web address (location) of an internet resource such as a website or an image within a website.
The technical term for the web address (location) of an internet resource such as a website or an image within a website.
Computer code with known security weaknesses.
Unprivileged accounts include unprivileged user accounts and unprivileged service accounts.
Unprivileged operating environments are those used for activities that do not require privileged access, such as reading emails and browsing the web.
Most often refers to a free Wi-Fi network, like at a café or shop.
An area not certified to the physical security requirements for a Security Zone Two to Security Zone Five area, as defined in the Department of Home Affairs’ Protective Security Policy Framework, Entity facilities policy, to allow for the processing or storage of classified data.
Any IT equipment that an organisation does not trust. For example, unknown IT equipment (which might belong to malicious actors), or an uncontrolled personal mobile device of an employee.
An act of updating something or someone or an updated version of something.
Universal Serial Bus
A small piece of hardware that stores data, sometimes called a jump drive, thumb drive or flash drive.
An individual that works for an organisation and is authorised to access a system.
User accounts include privileged user accounts and unprivileged user accounts.
The overall experience of a person using a product such as a website or computer application, especially in terms of how easy or pleasing it is to use.
The means by which the user and a computer system interact, in particular the use of input devices and software.