Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
A security measure requiring two distinct forms of verification before granting access to a system or account. (Also known as: Two-Step Verification)
Example: When logging into an email account, you enter your password and then input a verification code sent to your email.
See also: MFA, Authentication
A HTTP status code indicating that the requested web page could not be found on the server.
Example: When trying to visit a removed blog post, the user received a 404 Error page.
An access control model that grants permissions based on user attributes such as role, location, or department.
Example: Employees can only access financial data if they are in the finance department and working from the office.
A set of mechanisms and policies designed to restrict unauthorised users from accessing systems, networks, or data. Access control typically involves authentication (verifying identity) and authorisation (granting permissions).
Example: In an office, employees may need to use a swipe card (authentication) to enter certain areas, and only managers may have permission (authorisation) to access sensitive files.
A hardware device, such as a router or hub, that allows Wi-Fi enabled devices to connect to a wired network, providing wireless access within a defined area.
Example: The university installed multiple access points to ensure stable Wi-Fi coverage across campus.
See also: Wi-Fi, Peripheral, Hardware
A list of rules that specify who or what is allowed to access a resource and what operations they can perform.
Example: A firewall uses an ACL to permit or deny traffic from specific IP addresses.
Software or browser extension that removes or hides online advertisements.
Example: She installed an ad blocker to prevent pop-ups while browsing news sites.
The Address Bar is the text field in a web browser, usually near the top, where users enter a website's URL to navigate to a specific web page.
Example: The user typed www.digitaldreams.com.au into the address bar to access the Digital Dreams website.
See also: Browser
A type of broadband internet connection that uses existing telephone lines with higher download than upload speeds.
Example: A household in regional NSW uses ADSL for internet access where fibre is not yet available.
See also: Broadband, SDSL, NBN
A prolonged, targeted cyberattack where an intruder gains unauthorised access to a network and remains undetected for an extended period, often to steal sensitive data.
Example: A hacker group infiltrates a government agency's network and remains hidden for months, slowly exfiltrating classified documents.
Software that automatically displays or downloads advertising material when a user is online. While not always malicious, some adware can compromise privacy or security.
Example: The free game came with adware that showed constant banner ads.
See also: Malware
A security measure where a system or network is physically isolated from other networks, especially the internet, to protect against cyber attacks.
Example: Highly sensitive government computers are kept offline to prevent external hacking attempts.
A set of rules or processes used for problem-solving or calculation, often by computers.
Example: Search engines use complex algorithms to rank web pages.
The discovery, interpretation, and communication of meaningful data patterns, often for web traffic.
Example: The marketing team reviewed website analytics to understand visitor behaviour.
A mobile operating system developed by Google, used on many smartphones and tablets.
Example: Many smartphones in Australia run on the Android platform.
See also: Operating System
The process of removing or altering personal identifiers in data sets to prevent individuals from being identified.
Example: Customer data is anonymised by replacing names and email addresses with generic IDs before being shared with researchers.
The American National Standards Institute (ANSI) is a private non-profit organisation that oversees the development of voluntary consensus standards for products, services, processes, and systems in the United States.
Example: ANSI character encoding was used in early Windows systems for representing text before the adoption of Unicode.
Techniques used to prevent or hinder digital forensic investigations by erasing or obscuring evidence.
Example: A hacker uses anti-forensics tools to delete logs and hide their tracks after a data breach.
A program designed to detect, prevent, and remove malicious software (malware) like viruses, worms, and trojans.
Example: Antivirus Software can scan your computer regularly and alert you if it finds a virus.
See also: Software
A set of protocols for building and interacting with software applications.
Example: The developer used a weather API to add live forecasts to the app.
An Application, or App, is a software program designed to help users perform specific tasks, such as word processing, web browsing, or messaging, and can run on computers, mobile devices, or even in a web browser.
Example: He downloaded a budgeting app to manage his monthly expenses.
See also: Software
Allowing only approved applications to run on a system, blocking all others by default to prevent malware.
Example: A business uses application whitelisting to ensure only verified software runs on employee computers.
A collection of historical records or files stored digitally for long-term preservation.
Example: The researcher accessed a digital archive of 1990s websites.
A digital file that is sent along with an email or electronic message, which can include documents, images, videos, or other types of data.
Example: She included a PDF attachment with her application to the council.
The total number of points where an attacker can attempt to enter or exploit a system.
Example: A web server running multiple applications has a larger attack surface than a single-purpose server.
ATX (Advanced Technology eXtended) is a standard full-size motherboard measuring 305mm x 244mm, offering multiple expansion slots and ports for high-performance computing.
Example: A gaming PC used a standard ATX motherboard to support a powerful graphics card and multiple drives.
See also: Motherboard
The process of verifying the identity of a user, system, or device, typically using credentials such as passwords, biometrics, or security tokens, to grant access to secure systems or information.
Example: Logging into your email by entering a username and a password.
See also: Credentials, 2FA, MFA
The process of granting specific permissions to a user, device, or system based on verified identity and predefined rules, determining what actions they are allowed to perform.
Example: After logging into a file server, users with the role of "editor" are authorised to modify documents, while others can only view them.
A graphical representation of a user in a digital environment.
Example: He created a cartoon avatar for his profile on the forum.
A hidden method within software, hardware, or a system that allows someone to bypass normal authentication or security controls. Backdoors can be intentionally coded by developers for maintenance purposes or maliciously created by attackers to gain unauthorised access.
Example: A software developer includes a backdoor for troubleshooting, while a hacker might install a backdoor in a compromised server to maintain covert access.
The server-side part of a website or application that handles logic, database interaction, and server configuration.
Example: The developer fixed a bug in the back end that caused login issues.
See also: Front End
A copy of data stored separately to restore original information in case of loss.
Example: She made weekly backups of her laptop to an external drive.
See also: Off-site Backup
Baiting is a social engineering attack where an attacker lures a victim into performing a specific action by offering something tempting, such as free software, a USB drive, or access to exclusive content. The bait often contains malware or leads to a phishing site.
Example: An employee finds a USB drive labelled "Confidential Payroll Data" in the office car park. Curious, they plug it into their work computer, unknowingly installing malware that grants the attacker remote access to the system.
The maximum amount of data that can be transmitted over a network connection in a specific period, usually measured in megabits per second (Mbps), affecting the speed and capacity of internet connections.
Example: Streaming multiple HD videos simultaneously consumed a large portion of their available bandwidth.
A form of online advertising displayed as a rectangular graphic at the top, bottom, or side of a web page.
Example: A banner ad for travel deals appeared at the top of the news website.
Firmware stored on a motherboard chip that initialises hardware during the startup process before handing control to the operating system.
Example: She updated the BIOS to improve hardware compatibility.
See also: POST (Power-On Self-Test)
Measures to protect the BIOS (Basic Input/Output System) from unauthorised changes or tampering.
Example: Enabling a BIOS password prevents unauthorised users from making changes to system settings.
A decentralised digital currency that operates without a central bank, using peer-to-peer technology and cryptographic verification on a public ledger called the blockchain.
Example: He chose to invest in Bitcoin due to its growing popularity and decentralised nature.
BitLocker is a full disk encryption feature included with Microsoft Windows (Enterprise and Pro editions) that protects data by encrypting entire volumes.
Example: An organisation uses BitLocker to encrypt the hard drives of employee laptops to prevent data theft if devices are lost or stolen.
See also: Data Encryption
The rate at which bits of data are transmitted or processed, typically measured in kilobits or megabits per second, and often used to describe the quality of audio or video files.
Example: The video was streamed at a high bitrate to maintain clarity on larger screens.
A peer-to-peer protocol for distributing files across the internet efficiently.
Example: She downloaded the Linux distribution using BitTorrent.
A hacker who violates security for personal gain, malicious intent, or to cause damage to systems or data.
Example: A black hat hacker breaches a company's database and sells the stolen customer data on the dark web.
See also: White Hat Hacker, Hacker
A security strategy where specific applications, users, IP addresses, or processes that are known to be malicious or unauthorised are explicitly blocked from accessing a system, network, or resource. Everything not included on the blacklist is allowed by default, but may still be monitored for suspicious activity.
Example: A web server's firewall blacklists IP addresses associated with repeated unauthorised login attempts to prevent further access.
See also: Whitelisting
A regularly updated website or section of a website featuring written content, often in a conversational style, maintained by an individual or organisation. The term 'blog' is a shortened form of 'weblog', which originated in the late 1990s to describe online journals or logs of web activity.
Example: She started a food blog to share recipes and reviews of local cafés.
A group responsible for defending an organisation's systems and networks by identifying and mitigating security threats.
Example: The blue team monitors network traffic for suspicious activity and responds to any detected threats.
See also: Red Team, Purple Team
A wireless technology for exchanging data over short distances.
Example: She connected her phone to the car stereo via Bluetooth.
A saved link to a web page for easy access later.
Example: He added a bookmark to his university's library catalogue.
Boot refers to the process of starting a computer and loading the operating system into memory from the hardware's initial power-on state.
Example: After turning on the computer, the BIOS performs a POST and then boots into the installed operating system from the SSD.
See also: POST (Power-On Self-Test)
An automated software program that performs tasks online. Bots can be used for legitimate purposes or malicious activities, such as spamming.
Example: A search engine uses bots to index websites, while cyber criminals use bots to send out spam emails.
A network of internet-connected devices infected with malware and controlled by a central attacker. Botnets are often used for large-scale attacks like DDoS (Distributed Denial-of-Service).
Example: Thousands of infected computers are used simultaneously to overwhelm a website, making it crash.
See also: DDoS, Zombie Computer
The process of informing affected individuals and authorities about a data breach, often required by law.
Example: After a data breach, a company sends emails to customers notifying them that their personal information may have been exposed.
A high-speed internet connection that provides fast and continuous access to online services, typically delivered via technologies such as DSL, cable, fibre optic, or satellite. In Australia, broadband is commonly provided through the National Broadband Network (NBN), which aims to deliver improved internet performance across the country.
Example: The government subsidised regional broadband to improve internet access in remote communities through the NBN.
A software application used to access, retrieve, and view content on the World Wide Web, including websites, images, and multimedia, with popular examples being Brave, Chrome, Firefox, and Safari.
Example: He updated his browser to improve compatibility with new web applications.
See also: Software
A trial-and-error method where an attacker tries every possible password combination to gain access to an account.
Example: A hacker uses automated software to guess the password to your email by systematically trying every combination of letters and numbers.
A process where data is preloaded into a reserved area of memory to ensure smooth playback.
Example: The video kept buffering due to a slow internet connection.
An error or flaw in software that causes it to behave unexpectedly.
Example: A bug in the app caused it to crash when uploading photos.
A policy that allows employees to use their personal devices, like laptops or smartphones, for work purposes. This can introduce security risks if devices aren't properly secured.
Example: An employee uses their personal phone to access company emails.
A basic unit of digital information storage equal to eight bits, commonly used to represent a single character of text and measure file sizes and memory capacity.
Example: The data file used 700 bytes of storage space.
An organisation that issues digital certificates to verify identities and secure online communications.
Example: Your web browser shows a padlock icon when visiting a secure website, indicating a valid certificate from a trusted CA.
A temporary storage area in computers or browsers used to store frequently accessed data or files to speed up future access. Caching improves performance by reducing the need to re-download or reprocess information each time it is requested.
Example: Clearing the browser cache resolved the website loading issue.
Completely Automated Public Turing test to tell Computers and Humans Apart; a security feature used to differentiate between human users and automated bots by requiring users to complete a challenge, such as identifying objects in images or entering distorted text.
Example: Before submitting the form, he completed a CAPTCHA to prove he wasn't a robot.
Software that acts as a gatekeeper between users and cloud services to enforce security policies and protect data.
Example: A CASB monitors and controls employee access to cloud services like Google Drive and Dropbox.
The Command Line Interface (or CLI) is a text-based user interface that allows users to interact with a computer system by typing commands.
Example: A system administrator used the CLI to configure network settings on a Linux server.
See also: Terminal
A technique that tricks users into clicking something different from what they think, often to steal information or install malware.
Example: A deceptive webpage has a "Play" button that actually triggers a hidden download of malicious software.
The delivery of computing services such as storage, processing power, databases, and software over the internet, allowing users to access and manage resources on demand without maintaining physical infrastructure.
Example: The organisation adopted cloud computing to reduce IT costs and enable remote access to files.
A set of measures designed to protect data, applications, and services hosted in cloud environments.
Example: Encrypting data stored in Google Drive and using multi-factor authentication to access your cloud account.
Cloud Storage is a service model where data is stored on remote servers accessed via the internet, maintained by third-party providers.
Example: An Australian business uses cloud storage to back up client files.
Complementary Metal-Oxide-Semiconductor (CMOS) is a technology used to store BIOS settings and system configuration data in a computer, typically powered by a small battery on the motherboard.
Example: After replacing the CMOS battery, the technician reconfigured the system time and boot order in the BIOS.
See also: BIOS
A software platform that enables users to create, manage, and modify digital content on websites without needing advanced technical knowledge.
Example: The council's website was built using a CMS that allowed staff to update pages easily.
A Canonical Name (CNAME) record is a type of DNS record that maps an alias domain name to the true or canonical domain name.
Example: The CNAME record maps www.example.com to example.com so both addresses point to the same website.
See also: DNS (Domain Name System)
A username and password that has been stolen or exposed, allowing unauthorised access to accounts.
Example: Hackers use compromised credentials from a data breach to log into victims' email accounts.
A small piece of data stored on the user's device by a website to remember preferences or login details.
Example: The website asked for cookie consent to track usage.
Systems that integrate digital and physical components, such as industrial control systems or smart grids.
Example: A smart factory uses CPS to automate and monitor production lines in real-time.
The main part of a computer that performs most of the processing by executing instructions from software and managing tasks.
Example: Upgrading the CPU improved the computer's performance.
An unexpected failure of a software program or operating system that causes it to stop functioning properly, often resulting in data loss or the need to restart the system.
Example: The word processor experienced a crash and closed before she could save her document.
The process used by search engines to discover and index web pages.
Example: Googlebot crawls websites to add them to search results.
A Crawler, also known as a web spider or bot, is a program used by search engines to scan and index content from websites.
Example: Google's crawler visited the website to index new blog posts for search results.
See also: Search Engine
The authentication information used to verify a user's identity, typically consisting of a username and password, and sometimes additional factors.
Example: Accessing the university's student portal requires entering valid credentials, including a student ID and password.
A type of cyber attack where attackers use large sets of stolen username and password combinations, often obtained from previous data breaches, to gain unauthorised access to multiple online accounts. This attack exploits the common practice of people reusing the same credentials across different platforms and services.
Example: After acquiring a database of stolen login credentials from a breached e-commerce website, attackers attempt to access users' social media and banking accounts using the same email and password combinations.
A web security vulnerability that allows attackers to inject malicious scripts into websites viewed by other users.
Example: An attacker inserts a script into a comment section of a blog, which then steals login cookies from anyone who views the comment.
The practice of securing information by converting it into an unreadable format (encryption) so only authorised users can decode it.
Example: Sending an encrypted email so only the intended recipient, who has the decryption key, can read it.
An attack where a malicious website tricks a user's browser into performing actions on another website where the user is authenticated.
Example: A user clicks a malicious link that causes their bank account to transfer funds without their knowledge.
A language used to describe the presentation and layout of HTML elements on web pages.
Example: The designer used CSS to change the font and colour scheme of the website.
See also: HTML
Any deliberate attempt to damage, disrupt, or gain unauthorised access to computer systems, networks, or data.
Example: A hacker launches a ransomware attack on a hospital, encrypting patient records until a ransom is paid.
Illegal activities carried out using computers or the internet, such as hacking, fraud, or identity theft.
Example: A scammer steals credit card information through a fake shopping website.
The act of secretly obtaining sensitive information from individuals, organisations, or governments for strategic advantage.
Example: Hackers infiltrate a tech company's network to steal trade secrets about a new product.
The regular practices and habits that individuals and organisations follow to maintain security and protect against cyber threats.
Example: Regularly updating software, using strong passwords, and enabling multi-factor authentication are good cyber hygiene practices.
The ability of an organisation to prepare for, respond to, and recover from cyber attacks while continuing operations.
Example: A company with strong cyber resilience can quickly restore systems after a ransomware attack without major disruption.
The practice of protecting systems, networks, and digital data from unauthorised access, attacks, or damage. Cyber security includes measures such as firewalls, encryption, authentication, and user education to defend against threats like malware and hacking.
Example: The company implemented new cyber security protocols after a phishing incident.
A part of the internet that is not indexed by standard search engines and requires special software such as Tor to access. The dark web is often associated with anonymity and is sometimes used for illicit activities, though it also hosts privacy-focused content and communication.
Example: Law enforcement agencies monitor the dark web to investigate cyber crime and illegal trade.
Information that is stored, processed, or transmitted by a computer.
Example: The survey collected data from thousands of respondents.
An organised collection of structured information that can be easily accessed, managed, and updated. Databases are used in a wide range of applications, from storing customer records to powering websites and apps.
Example: The school's database contains student enrolment details and academic records.
An incident where confidential or sensitive data is accessed or disclosed without authorisation.
Example: Hackers break into a retail company's database and steal customers' credit card details.
A facility used to house computer systems, storage, and networking equipment, providing centralised infrastructure for storing, managing, and processing data. Data centres are critical to cloud services and internet operations.
Example: The bank's data centre is located in a high-security building with backup power and climate control.
The process of converting data into a coded format to prevent unauthorised access. Only those with the decryption key can read it.
Example: Your online banking app encrypts your data, so even if it's intercepted, it can't be read without the correct key.
See also: Encryption, Decryption
The unauthorised transfer of data from a computer or network to an external location, often performed stealthily.
Example: An attacker gains access to a company's database and secretly sends customer records to a remote server.
Ensuring that data remains accurate, consistent, and unaltered during storage or transmission.
Example: A financial report is transmitted securely to ensure it isn't tampered with during transfer.
The unintended deletion or corruption of digital information.
Example: He experienced data loss after his hard drive failed.
See also: Data
Tools and strategies designed to prevent unauthorised access, use, or sharing of sensitive data.
Example: A company uses DLP software to prevent employees from sending confidential information via email.
See also: Data Loss
The process of obscuring sensitive data by replacing it with fictional or altered data, maintaining usability while protecting privacy.
Example: In a training database, real customer names and credit card numbers are replaced with fake data.
A small unit of data transmitted over a network that includes both the actual data and metadata such as destination address and sequence information. Data is broken into packets for efficient transfer and reassembled upon arrival.
Example: During a video call, data packets were lost due to a weak Wi-Fi connection.
The process of retrieving lost, corrupted, deleted, or inaccessible data from storage devices such as hard drives, SSDs, or USB drives.
Example: A technician performs data recovery on a damaged external hard drive to retrieve a client's family photos.
The process of securely erasing data to prevent it from being recovered or misused.
Example: Before disposing of old hard drives, a company uses data sanitisation techniques to wipe all information.
The movement or transmission of digital information between devices, networks, or storage systems. Data transfer speed, often measured in megabits per second (Mbps) affects how quickly files can be uploaded or downloaded.
Example: The cloud backup service offers unlimited data transfer for all subscriptions.
A type of DoS attack launched from multiple compromised devices (botnet) to overwhelm a system.
Example: An e-commerce site is bombarded by traffic from thousands of infected devices, making it unusable.
See also: DoS
The process of identifying and fixing errors in software code.
Example: The team spent hours debugging the app before its release.
The process of converting encrypted data back into its original form.
Example: The file could only be accessed after successful decryption.
See also: Encryption
AI-generated media, such as videos or audio, that look and sound real but are manipulated to deceive viewers.
Example: A deepfake video shows a politician saying something they never actually said, causing public confusion.
A preset value or setting automatically applied by a computer system, application, or device when the user does not specify an alternative. Defaults help standardise operations and ensure functionality out of the box.
Example: The browser opened to its default homepage until he changed the settings.
The main user interface of a computer's operating system, typically displaying icons, files, and shortcuts on a background screen. It can also mean a type of computer designed for regular use at a single location.
Example: He saved the document to the desktop for quick access.
Any hardware component that can connect to or be used with a computer system, including input, output, and storage devices.
Example: A printer is a common output device connected to a computer to produce hard copies of digital documents.
See also: Peripheral, Hardware
A network protocol that automatically assigns IP addresses and other network settings to devices on a network.
Example: When a laptop connects to a school Wi-Fi network, the DHCP server assigns it an IP address for internet access.
See also: IP Address
The collection of data and traces left behind by a user's activity on the internet, including browsing history, social media posts, email interactions, and online purchases. This information can be used to build a profile of user behaviour and preferences.
Example: Posting on social media contributes to your digital footprint.
The process of collecting, analysing, and preserving digital evidence to investigate cyber crimes or security incidents.
Example: After a hacking incident, digital forensics experts recover deleted files to trace the attacker's activities.
A set of attributes and credentials that represent a person or entity online.
Example: Her digital identity includes her email, username, and biometric data.
An electronic signature used to verify the authenticity of digital messages or documents.
Example: He used a digital signature to validate the PDF contract.
A virtual container or folder used to organise and store files on a computer or network. Directories help keep data structured and can include subdirectories within them.
Example: The images were stored in a separate directory on the server.
An email authentication method that uses cryptographic signatures to verify that an email was sent from an authorised mail server and that its content has not been tampered with during transit.
Example: An outgoing email is digitally signed with DKIM, and the recipient's mail server verifies the signature to confirm its authenticity.
An email authentication protocol that uses SPF and DKIM to verify an email's authenticity and provides domain owners with reporting capabilities to monitor and enforce email authentication policies.
Example: A company implements a DMARC policy to instruct recipient servers to reject any emails that fail SPF or DKIM checks.
The system that translates human-readable domain names into IP addresses, allowing users to access websites without remembering numeric addresses.
Example: When the DNS servers failed, users could not reach any websites by domain name.
See also: Domain Name
DNS filtering is a technique used to restrict access to certain websites based on domain names. It prevents users from reaching malicious or inappropriate sites by blocking DNS queries that resolve to blacklisted domains.
Example: A business implements DNS filtering to block employees from accessing known malware sites and prevent accidental downloads of ransomware.
See also: Protective DNS (PDNS)
An attack that manipulates DNS (Domain Name System) records to redirect users to fraudulent websites.
Example: You type in your bank's website address, but DNS spoofing sends you to a fake site designed to steal your login details.
A unique address used to identify a website on the internet, typically ending in .com, .org, .au, etc.
Example: They registered a new domain for their business website.
An attack where a system is overwhelmed with traffic or requests, making it unavailable to legitimate users.
Example: A hacker floods a website with so many requests that it crashes and can't be accessed.
See also: DDoS
The process of receiving digital data from the internet or a remote system onto a local device, typically for storage or offline use.
Example: She downloaded a report from the government website.
See also: Upload
A physical or virtual storage unit used to save and retrieve digital data, such as a hard drive, USB drive, or cloud-based storage drive.
Example: He transferred the files onto a USB drive.
See also: Hardware
The unintentional download of malware when visiting a compromised website, often without the user's knowledge.
Example: Visiting an infected website causes a malicious file to be downloaded onto your computer automatically.
A software program that allows the operating system to communicate with hardware devices, enabling proper functionality.
Example: After installing a new graphics card, the user downloads the latest driver to ensure compatibility with games.
Dual Boot refers to the setup of a computer system to run two different operating systems on separate partitions, allowing the user to choose one at startup.
Example: A developer sets up a dual boot system with Windows 11 and Ubuntu for software testing.
An IP address that is automatically assigned to a device by a network using DHCP (Dynamic Host Configuration Protocol) and may change over time. Dynamic IP addresses are commonly used for home internet connections and general-purpose devices.
Example: Her home router was assigned a dynamic IP address by the internet provider, which changed after a reboot.
See also: IP Address, Static IP Address
Extended ATX (E-ATX) is a larger motherboard form factor measuring up to 305mm x 330mm, used in high-end workstations and servers for additional features and expansion.
Example: He wanted an E-ATX motherboard for his computer for extra RAM and PCIe slots.
See also: Motherboard, ATX
The buying and selling of products or services through online platforms, including websites and mobile apps, often involving electronic payments.
Example: E-commerce sales surged during the holiday season.
An attack where a hacker intercepts private communications, such as emails or phone calls, to steal sensitive information.
Example: An attacker uses a packet sniffer to capture login credentials sent over an unencrypted Wi-Fi network.
A security solution that continuously monitors endpoint devices (such as computers, servers, and mobile devices) for suspicious activity, detects threats, and responds to security incidents in real time.
Example: EDR software detects and stops malware on an employee's laptop before it can spread to the network.
Email or e-mail (electronic mail) is a system for composing, sending, receiving, and storing electronic messages over the internet or internal networks.
Example: She checked her email for updates from the client.
See also: Email Address
A unique identifier for an email account, typically in the format username@domain, used to send and receive messages.
Example: The customer sent an enquiry to support@company.com for technical assistance.
See also: Email
Metadata found at the start of an email that provides information such as sender, receiver, etc.
Example: The email header showed the sender's IP address.
The practice of forging email headers to make a message appear as though it was sent from a legitimate source, often used in phishing scams.
Example: The phishing email was sent using email spoofing.
A sequence of keyboard characters used to represent facial expressions or emotions in text, such as :) for a smile.
Example: He added a smiley emoticon to lighten the tone of the message. :-)
A method of securing digital information by converting it into a coded format that can only be read by someone with the correct decryption key.
Example: Encryption protected the files during cloud transfer.
See also: Decryption
A mathematical process used to encrypt and decrypt data, ensuring secure communication and data protection.
Example: AES (Advanced Encryption Standard) is an encryption algorithm widely used to encrypt sensitive data like financial transactions.
A string of characters used in encryption algorithms to encode or decode data, ensuring secure communication.
Example: Your messaging app encrypts messages using an encryption key so only the recipient can read them.
Any device that connects to a network and serves as a potential entry point for cyber threats, such as computers, servers, smartphones, tablets, IoT devices, and workstations.
Example: A company implements endpoint security measures on all employee laptops and mobile devices to prevent malware infections and unauthorised access.
Protective measures and tools designed to secure endpoint devices such as desktops, laptops, tablets, and smartphones from cyber threats. It typically includes antivirus software, firewalls, encryption, and advanced threat detection to prevent unauthorised access and data breaches.
Example: Installing antivirus software and encrypting data on company laptops.
See also: Endpoint
Security software that provides comprehensive protection for endpoint devices, combining antivirus, anti-malware, and firewall features.
Example: An organisation installs an EPP on all employee laptops to protect against malware and unauthorised access.
See also: Endpoint
A system where encryption keys are held by a trusted third party, allowing access in emergencies or by authorised request.
Example: A company stores encryption keys with a third party to ensure they can access data if their systems fail.
A standard wired networking technology commonly used in homes and offices to connect devices within a Local Area Network (LAN).
Example: The desktop was connected to the internet via an Ethernet cable.
A system-generated file that records events related to hardware, software, or security on a device or network for diagnostic and monitoring purposes.
Example: The administrator checked the event log after the system crash.
A piece of code or technique that takes advantage of a vulnerability in a system to perform malicious actions.
Example: An attacker uses an exploit to gain access to a server running outdated software.
A collection of tools used by cyber criminals to exploit known vulnerabilities in systems or software.
Example: An exploit kit targets unpatched versions of a web browser to install ransomware on users' devices.
A restricted network that allows external parties, such as partners or suppliers, limited access to an organisation's internal systems and data.
Example: The company used an extranet to share data with its suppliers.
A document or web page that lists and answers common queries on a specific subject to assist users.
Example: The website had an FAQ section to help new users.
A high-speed transmission technology that transmits data as light through flexible glass or plastic cables. It is widely used in Australia's NBN to deliver faster and more reliable broadband.
Example: They switched to fibre optic internet for faster downloads.
A unit of digital information stored on a computer or network, containing text, images, audio, video, or other data types.
Example: She uploaded the file to the company server.
Malware that resides in a computer's memory rather than the hard drive, making it difficult to detect and remove.
Example: An attacker exploits a vulnerability in a web browser to run fileless malware that steals data during a session.
The distribution or access provision of digital files over a network, either publicly or within authorised groups.
Example: File sharing was used to distribute meeting documents.
A security system (hardware or software) that monitors and controls incoming and outgoing network traffic based on security rules.
Example: Your home router may have a firewall that only allows authorised traffic through.
Software permanently installed on a hardware device that controls its low-level functions and can be updated for improvements or fixes.
Example: The printer's firmware was updated to fix a bug.
A former multimedia platform for displaying animations, videos, and interactive content in browsers, now largely replaced by HTML5.
Example: The website's old games required Flash to run.
A virtual location in a file system used to organise and store related digital files on a computer or server.
Example: He saved all invoices in the 'Accounts' folder.
The process of preparing a storage device for use by erasing existing data and setting up a new file system.
Example: Before installing Windows, the technician formats the hard drive to remove all previous data.
An online platform where users post messages and replies in threaded discussions on specific topics, often moderated by admins.
Example: She asked for tech advice on a programming forum.
The part of a software application or website that users interact with directly. It includes the visual layout, design, and elements such as buttons, menus, and text fields, and is typically built using HTML, CSS, and JavaScript.
Example: The front end of the website was redesigned to improve user experience and mobile compatibility.
See also: Back End
A standard method for uploading or downloading files between computers over the internet or a network.
Example: They used FTP to upload files to the web server.
A hardware or software component that acts as a bridge between different networks, managing traffic and translating protocols.
Example: The network gateway provided access to the internet.
A data protection and privacy regulation enacted by the European Union (EU) that governs how organisations collect, store, process, and share the personal data of EU citizens. Although it is an EU regulation, GDPR applies to any organisation worldwide, including Australian businesses, that handle the personal data of individuals located in the EU.
Example: An e-commerce business selling products to customers in Europe must ensure its website complies with GDPR requirements, such as obtaining explicit consent for data collection, providing clear privacy notices, and offering customers the ability to delete their personal data upon request.
A unit of digital information equal to exactly 1,024MiB. (1024 mebibytes.) There is no confusion with how big a gibibyte (GiB) is as there could be with a gigabyte (GB). Therefore, GiB is the more correct term to use.
Example: The operating system used approximately 10GiB of disk space.
See also: Gigabyte (GB), Mebibyte (MiB)
A digital image format that supports simple animations and is widely used for memes and reactions online.
Example: He shared a funny GIF in the group chat.
A unit of digital information equal to 1,024MB (1024 megabytes) in most computing contexts, however disk drive manufacturers use it to mean 1,000,000 bytes in order to report larger storage capacities.
Example: The operating system used approximately 10GB of disk space.
See also: Gibibyte (GiB), Megabyte (MB)
An operating system combining the GNU Project's software tools and utilities with the Linux kernel. This combination provides a complete, free, and open-source system used widely for servers, desktops, and various computing devices.
Example: Ubuntu is a popular GNU/Linux distribution used by many developers worldwide.
See also: Operating System
A specialised processor designed to accelerate rendering of images, video, and animations, improving graphics performance in computers.
Example: The gamer upgraded to a more powerful GPU for smoother gameplay.
See also: Hardware
A visual interface that allows users to interact with electronic devices through graphical icons and visual indicators.
Example: Most computer users navigate their computers using the GUI provided by Windows, macOS or GNU/Linux.
A person who uses technical skills to access systems or data. Hackers can be ethical (white hat) or malicious (black hat).
Example: A white hat hacker finds vulnerabilities in a company's system and helps them fix it.
See also: White Hat Hacker, Black Hat Hacker
The physical components of a computer system, including internal parts and external devices.
Example: Upgrading the hardware by adding more RAM improved the performance of the laptop.
A physical device that securely manages and protects cryptographic keys, performing encryption and decryption operations.
Example: Banks use HSMs to secure customer transaction data and protect encryption keys from theft.
A malicious modification to hardware that can create security vulnerabilities or backdoors.
Example: A compromised microchip in a computer can allow attackers to bypass security measures.
When two different pieces of data produce the same hash value, potentially compromising data integrity.
Example: An attacker exploits a hash collision to trick a system into accepting a malicious file as legitimate.
An algorithm that converts data into a fixed-length string (hash) for verification purposes. Hashes are used to ensure data integrity.
Example: When you download a file, its hash value can be compared with the original to ensure it hasn't been altered.
A keyword or phrase preceded by the # symbol used on social media platforms to categorise content and enable searchability.
Example: They used the hashtag #AusOpen during the tennis tournament.
A data storage device used for storing operating systems, software, documents, and other digital files, either internally or externally.
Example: The hard drive failed and all data was lost.
A digital interface used to transmit audio and video signals between devices such as computers, monitors, and TVs.
Example: He connected his laptop to the TV using an HDMI cable.
A Heatsink is a passive cooling device made of metal, typically aluminium or copper, that dissipates heat away from electronic components like the CPU to prevent overheating.
Example: The technician installed a larger heatsink on the desktop processor to improve cooling during heavy use.
A numbering system based on 16 symbols (0-9 and A-F) used in computing for efficient representation of binary-coded values.
Example: Memory addresses are often written in hexadecimal format.
A hit refers to a request made to a web server for a single file, such as a page, image, or script, and is used as a raw measure of web traffic.
Example: The homepage received over 10,000 hits in one day after a product launch.
See also: Page View
The main entry page of a website or the default page shown when a web browser starts.
Example: The homepage featured the latest news updates.
A decoy system designed to lure attackers, allowing security teams to observe their methods and gather intelligence.
Example: A fake database is set up to attract hackers and track their activities without risking real data.
A service that provides storage space and access for websites or applications on internet-connected servers.
Example: They paid for web hosting to launch their online store.
A location or device that provides wireless internet access via Wi-Fi, either public or private.
Example: She connected to a public hotspot at the airport.
The standard markup language used to create and structure content on web pages, including text, images, and links. It forms the foundation of most websites and is interpreted by web browsers.
Example: The developer edited the HTML to fix a formatting issue.
See also: CSS
A protocol used for transmitting data over the internet. It defines how messages are formatted and transmitted, and how web servers and browsers should respond to various commands. HTTP is the foundation of data communication on the World Wide Web.
Example: The website uses HTTP to load pages.
HyperText Transfer Protocol Secure; a secure version of HTTP that encrypts communication between browsers and websites.
Example: Online shops should use HTTPS for secure transactions.
A clickable link in a digital document or webpage that directs users to another location, file, or website.
Example: Clicking the hyperlink took her to the university's admissions page.
Software that allows multiple virtual machines to run on a single physical server, managing their resources and isolation.
Example: VMware and Hyper-V are popular hypervisors used to create and manage virtual machines.
See also: VM (Virtual Machine)
Managing and provisioning infrastructure through code and automation tools, rather than manual configuration.
Example: Using tools like Terraform to script the setup of servers, networks, and databases automatically.
A company or organisation that offers access to the internet, often used interchangeably with Internet Service Provider (ISP), though sometimes focusing on providing basic internet connectivity.
Example: The café used a local IAP to provide free Wi-Fi to its customers.
A network protocol used to send error messages and operational information, commonly used by tools like ping and traceroute.
Example: A technician uses ICMP to test network connectivity by sending ping requests to a remote server.
See also: Ping
A small graphical representation or symbol on a computer interface that represents a program, file, function, or command. Icons provide a visual and intuitive way for users to interact with software and operating systems.
Example: He clicked the trash bin icon to delete the file.
Policies and technologies for managing user identities and controlling access to systems and data.
Example: IAM ensures that only authorised employees can access sensitive HR records.
Policies and processes for managing and securing user identities and access rights within an organisation.
Example: Regular reviews ensure employees have the correct level of access and that former employees' accounts are deactivated.
The process of verifying a person's identity before granting them access to systems, services, or information.
Example: A bank requires photo identification and proof of address when setting up a new account.
The fraudulent acquisition and use of someone's personal information, usually for financial gain.
Example: She reported identity theft after noticing unfamiliar charges on her credit card.
A security system that monitors network traffic for suspicious activities and alerts administrators if potential threats are detected.
Example: An IDS identifies an unusual number of login attempts from different countries and warns the security team about a possible attack.
A standard email protocol that allows users to access and manage their email messages on a mail server from multiple devices. Unlike POP, IMAP keeps messages on the server, enabling synchronisation across devices.
Example: IMAP allows users to read email from multiple devices.
See also: POP3, Mail Server
A folder or location within an email system where incoming messages are received and stored. The inbox is typically the first place users check to view new or unread emails.
Example: She checked her inbox first thing in the morning for any urgent emails.
See also: Email
The process of identifying, managing, and mitigating cyber security incidents to minimise damage and restore normal operations.
Example: After a malware infection, the IT team follows an incident response plan to remove the malware and recover affected systems.
See also: Incident Response Plan
A structured set of instructions and procedures designed to help an organisation detect, respond to, and recover from cyber security incidents.
Example: When a data breach occurs, the IT team follows the incident response plan, which outlines steps like isolating affected systems, notifying stakeholders, and restoring data from backups.
See also: Incident Response
The process by which search engines or software organise and store data in a structured format to enable fast and efficient retrieval. In the context of websites, indexing refers to a search engine scanning and adding pages to its database.
Example: Search engines use indexing to list relevant web pages.
The practice of protecting information from unauthorised access, disclosure, alteration, or destruction. It encompasses policies, procedures, and technologies designed to safeguard data in all forms, ensuring confidentiality, integrity, and availability.
Example: The company implemented strict information security measures to protect customer data.
Data or commands entered into a computer system by a user or device. Input can be provided through various methods such as keyboards, mice, touchscreens, or sensors, and is processed by the system to produce an output.
Example: The user provided input through the keyboard.
A security risk posed by individuals within an organisation, such as employees or contractors, who may misuse their access for malicious purposes or due to negligence.
Example: An employee with access to sensitive customer data copies it onto a USB drive and sells it to competitors.
This is the process of setting up software or hardware so that it can function correctly on a computer system.
Example: The IT team performs the installation of software on all company laptops.
A form of real-time online text communication between users.
Example: They used instant messaging to coordinate the project.
A point of interaction where two systems, such as software and hardware, or software components, communicate and exchange information. In user computing, it often refers to the graphical layout through which users interact with a device or application.
Example: The app's user interface was clean and intuitive.
A global network of interconnected computers and servers that communicate using standard protocols to share information and resources. It enables access to services such as websites, email, and file sharing across the world.
Example: The internet is used for communication, information, and entertainment.
A private network accessible only to an organisation's members, employees, or authorised users. It uses internet technologies to share information, resources, and collaboration tools securely within the organisation.
Example: The company used its intranet to distribute internal memos and project updates.
A network of connected devices that can collect and exchange data, such as smart home gadgets and industrial sensors.
Example: A smart thermostat that you control via a mobile app is part of the IoT.
Internet Protocol Address; a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It identifies and locates devices on the network, allowing data to be routed correctly.
Example: The IP address 192.168.1.1 is commonly used for routers.
A list of IP addresses that are blocked due to malicious activity or policy violations.
Example: A company blacklists IP addresses linked to spam emails to protect its network.
A technique where an attacker falsifies the source IP address of a data packet to disguise their identity or impersonate a trusted source.
Example: An attacker sends a malicious email that appears to come from a colleague's IP address to trick you into clicking a harmful link.
Internet Protocol version 4; the fourth version of the Internet Protocol, using a 32-bit address format allowing for approximately 4.3 billion unique addresses. It is the most widely deployed IP version but has limited address space.
Example: An example of an IPv4 address is 192.168.1.1 and is commonly used for local networks.
See also: IP Address, IPv6
Internet Protocol version 6; the successor to IPv4, using a 128-bit address format to provide a vastly larger number of unique IP addresses. IPv6 addresses the limitations of IPv4 and supports improved routing and security features.
Example: An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
See also: IP Address, IPv4
The International Organization for Standardization (ISO) is an independent, non-governmental international body that develops and publishes global standards across various industries.
Example: ISO 27001 is a widely recognised standard for information security management systems.
A company or organisation that provides internet access along with additional services such as email, web hosting, and domain registration, often offering broader packages than an Internet Access Provider (IAP)
Example: They switched ISPs to get faster download speeds.
The use of computers and telecommunications for storing, retrieving, and sending information.
Example: She works in IT support for a government agency.
Software tools that identify if a mobile device has been jailbroken to bypass security restrictions.
Example: A banking app refuses to run if it detects that the device has been jailbroken.
See also: Jailbreaking
Removing software restrictions imposed by a device manufacturer to install unauthorised apps or modify system settings.
Example: Jailbreaking an iPhone to install apps not available on the App Store.
A high-level programming language used for developing cross-platform applications.
Example: The mobile app was developed using Java.
A scripting language used to create and control dynamic content on websites.
Example: JavaScript was used to animate the image slider.
Granting temporary, time-limited access to resources to minimise security risks associated with prolonged access.
Example: An IT administrator receives JIT access to a secure server only when maintenance is required.
A commonly used method of compressing digital images, especially photographs. JPEG files use lossy compression to reduce file size while maintaining acceptable image quality.
Example: She saved the photo as a JPEG to reduce the file size.
A network authentication protocol that uses tickets to allow secure communication over an insecure network.
Example: Employees in a company network use Kerberos to securely access shared resources without repeatedly entering passwords.
The core component of an operating system that manages hardware and system resources.
Example: The Linux kernel received a major update.
An input device consisting of keys used to enter data and commands into a computer.
Example: She typed the report using a wireless keyboard.
See also: Peripheral, Hardware, Mouse
Malicious software or hardware that records every keystroke made on a device, often used to capture passwords, credit card details, or other sensitive information.
Example: A cyber criminal installs a keylogger on a public computer, capturing login details from unsuspecting users.
A combination of two or more words that together represent a specific concept or search intent. Keyphrases are used in digital content and search engine optimisation (SEO) to improve visibility and relevance for complex or specific queries.
Example: She entered the keyphrase 'website design gold coast' into Google.
See also: Keyword
A behavioural biometric method that identifies users based on their typing patterns and rhythms.
Example: A system detects unusual typing patterns and flags a login attempt as potentially fraudulent.
A word used to identify, categorise, or search for information in digital systems. Keywords are often used in indexing, tagging, and search engine optimisation (SEO) to improve the discoverability of content.
Example: Keywords were added to the article to help it appear in relevant search results.
A unit of digital information equal to exactly 1,024 bytes. There is no confusion with how big a kibibyte (KiB) is as there could be with a kilobyte (KB). Therefore, KiB is the more correct term to use.
Example: The document was 50KiB in size.
See also: Kilobyte (KB), Byte
A unit of digital information equal to 1,024 bytes in most computing contexts, however disk drive manufacturers use it to mean 1,000 bytes in order to report larger storage capacities.
Example: The document was 50KB in size.
See also: Kibibyte (KiB), Byte
A noticeable delay between a user's action and the response by a system, often caused by network latency, insufficient processing power, or high system load. Lag is commonly experienced in online gaming or video conferencing.
Example: There was significant lag during the video call due to a slow internet connection.
A network of interconnected computers and devices within a limited geographical area such as a home, office, or building. LANs enable resource sharing, such as files, printers, and internet access, among connected devices.
Example: The office LAN was upgraded for faster file sharing.
The first web page a visitor arrives at after clicking a link from an ad, email, or search engine result, often focused on a single objective or message.
Example: The company created a landing page to promote its EOFY sale.
The delay between a user's action and the response from a network or system, typically measured in milliseconds. In networking, it refers to the time it takes for data to travel from the source to the destination.
Example: High latency caused lag during the video call.
A connection between two web resources, usually by hyperlink.
Example: He shared a link to the article in the group chat.
See also: Hyperlink
An open-source, Unix-like operating system kernel that serves as the foundation for various distributions (distros) such as Debian, Ubuntu and Fedora. Known for its stability, flexibility, and use in servers, desktops, and embedded systems.
Example: The web server was running on a Linux-based operating system for improved reliability.
See also: GNU/Linux, Operating System
Localhost refers to the local computer that a user is currently working on, typically accessed using the IP address 127.0.0.1 for testing purposes.
Example: A web developer tests a website on their machine using localhost before deploying it to a live server.
A file that records events, processes, or messages from software and systems.
Example: The firewall log file showed repeated access attempts.
Malicious code programmed to trigger when specific conditions are met, such as a certain date or event.
Example: A disgruntled employee installs a logic bomb that deletes files if they are fired.
The process of gaining access to a computer or network by entering credentials.
Example: He entered his username and password to login.
The act of exiting a system or account after use.
Example: She made sure to logout of her email on the public computer.
Linux Unified Key Setup (LUKS) is a standard for hard disk encryption in Linux, allowing secure management of multiple user passwords and encryption configurations.
Example: A systems administrator uses LUKS to encrypt a Linux server's storage to ensure sensitive data is protected from unauthorised access.
See also: Data Encryption
A Media Access Control (MAC) Address is a unique identifier assigned to a network interface card (NIC) for communication on a physical network segment.
Example: The technician used the MAC address to allow the student's laptop to connect to the university's secure WiFi network.
Malware that infects files containing macros, such as Microsoft Word or Excel documents, and executes malicious code.
Example: An infected Excel spreadsheet runs a macro that deletes files when opened.
A computer system that sends, receives, and stores email messages using standard protocols such as SMTP, IMAP, and POP3.
Example: A university manages its own mail server on-site to handle student and staff email communications internally.
See also: Email, IMAP, POP3, SMTP
Malicious advertisements that spread malware when users click on them or simply view them.
Example: An online advert on a legitimate website installs ransomware on a user's computer when clicked.
A general term for any malicious software designed to damage, disrupt, or exploit computers, networks, or data. Types include viruses, worms, ransomware, and spyware.
Example: A user downloads some free software from an unofficial website, unknowingly installing malware that tracks their keystrokes and steals their login credentials.
The study of malware to understand its origin, behaviour, and impact, helping to develop effective defences.
Example: A security analyst examines a ransomware sample to determine how it encrypts files.
See also: Malware
Software that allows organisations to manage and secure employees' mobile devices remotely.
Example: IT administrators use MDM to enforce security policies on company-issued smartphones.
A cybersecurity service where a third-party provider actively monitors, detects, and responds to security threats on behalf of an organisation. MDR services combine human expertise with automated tools to provide continuous threat protection.
Example: A small business without an in-house security team subscribes to an MDR service that continuously monitors its network and alerts the company when suspicious activity is detected.
A unit of digital information equal to exactly 1,024KiB. (1024 kibibytes.) There is no confusion with how big a mebibyte (MiB) is as there could be with a megabyte (MB). Therefore, MiB is the more correct term to use.
Example: The music file used 4MiB of space.
See also: Megabyte (MB), Kibibyte (KiB)
A unit of digital information equal to 1,024KB (1024 kilobytes) in most computing contexts, however disk drive manufacturers use it to mean 1,000 bytes in order to report larger storage capacities.
Example: The music file used 4MB of space.
See also: Mebibyte (MiB), Kilobyte (KB)
Typically referring to RAM (Random Access Memory), it is a computer component that stores data temporarily while the system is running.
Example: The computer has 32GB of memory, allowing it to run multiple applications simultaneously without slowing down.
Data that provides information about other data, such as details about its content, origin, format, or creation. Metadata helps organise, find, and manage information efficiently.
Example: The photo's metadata included the date and GPS location.
Meta Tags are HTML tags in a web page's head section that provide metadata such as descriptions and keywords for search engines.
Example: The web developer added meta tags to improve the site's visibility in search engine results.
A security method that requires users to provide two or more verification factors to access an account or system.
Example: Logging into your banking app by entering your username and password and then confirming a code sent to your mobile phone.
See also: 2FA, Authentication
MicroATX is a smaller motherboard form factor measuring 244mm x 244mm, with fewer expansion slots but compatible with most ATX cases.
Example: An office computer was built using a MicroATX motherboard to save space while maintaining basic functionality.
See also: Motherboard, ATX
Mini-ITX is a compact motherboard form factor measuring 170mm x 170mm, designed for small form factor systems with limited expansion capability.
Example: A home media centre was built using a Mini-ITX motherboard to fit inside a compact case under the TV.
See also: Motherboard
Malware that infects a web browser to intercept and manipulate online transactions.
Example: MitB malware captures your online banking login details while you're making a payment.
An attack where a cybercriminal intercepts and possibly alters communication between two parties without their knowledge.
Example: An attacker intercepts data transferred between your laptop and a public Wi-Fi network, stealing login credentials for your email.
Measures taken to protect mobile devices from threats like malware, data theft, and unauthorised access.
Example: Using device encryption, biometric authentication, and remote wipe features to secure smartphones.
A device that converts digital signals to allow internet access over phone lines or cable.
Example: The NBN technician installed a new modem.
See also: Peripheral, Hardware
A screen used to display information from a computer.
Example: She used a second monitor for multitasking.
See also: Peripheral, Hardware
The main printed circuit board (PCB) in a computer that connects and allows communication between the CPU, memory, storage devices, and other hardware components.
Example: Upgrading the motherboard improved the computer's overall performance and compatibility.
See also: Hardware
A hand-held pointing device used to interact with a computer's graphical user interface.
Example: He used the mouse to drag the file into the folder.
See also: Peripheral, Hardware, Keyboard
A common audio file format that compresses sound data.
Example: She downloaded her favourite songs as MP3 files.
A digital multimedia format most commonly used for video.
Example: The video lecture was saved as an MP4 file.
A third-party company that provides ongoing IT management and support services, including system monitoring, maintenance, cybersecurity, and helpdesk support, typically on a subscription basis.
Example: A small business hires an MSP to manage its IT infrastructure, ensuring that its network, cloud services, and cybersecurity measures are maintained and up to date.
See also: MSSP
A specialised type of MSP that focuses on cybersecurity, offering services such as threat monitoring, incident response, vulnerability assessments, and endpoint protection.
Example: A business hires an MSSP to monitor its network for cyber threats, protect its servers and workstations from malware, and provide rapid response to security incidents, reducing the risk of financial and operational disruptions.
See also: MSP
A specialised security service that not only detects threats but actively investigates and responds to them in real time, often by neutralising or mitigating attacks before they cause damage.
Example: After detecting a ransomware attack in progress, an MTR provider steps in, quarantines the affected systems, removes the malware, and implements security patches to prevent further infections.
Multilingual refers to a website or application that supports content in multiple languages to accommodate users from different linguistic backgrounds.
Example: A tourism website in Australia is multilingual, offering pages in English, French, and Japanese.
Content that uses a combination of text, audio, images, animations, or video.
Example: The online lesson included multimedia presentations.
Mail Exchange (MX) Record is a DNS record that specifies the mail server responsible for receiving email on behalf of a domain.
Example: To direct email traffic correctly, the domain example.com has an MX record pointing to mail.example.com.
See also: DNS, Mail Server
An open-source relational database management system.
Example: The website stored user data in a MySQL database.
See also: SQL
Security measures that restrict access to a network based on user identity, device security, and compliance with policies.
Example: Only devices with up-to-date antivirus software are allowed to connect to the company's network.
A server that handles queries regarding the location of a domain name's services.
Example: The domain's name server was updated during migration.
A dedicated file storage device connected to a network, allowing multiple users to access and share data centrally.
Example: A small office in Sydney uses a NAS to store shared documents and backups accessible to all staff.
See also: Hardware
Used by routers to allow multiple devices on a local network to share a single public IP address.
Example: The home router uses NAT so that all connected devices can access the internet using one external IP address.
See also: Public IP Address
A government-owned initiative in Australia designed to provide high-speed internet access to homes and businesses through a mix of technologies including fibre optic, fixed wireless, and satellite. The NBN aims to improve national connectivity and support digital services across urban and regional areas.
Example: After switching to the NBN, their household experienced faster and more reliable internet for streaming and remote work.
See also: Broadband
Etiquette and acceptable behaviour when communicating online.
Example: Using proper grammar and respect is part of good netiquette.
A collection of interconnected computers, devices, or systems that communicate and share resources such as data, files, and internet access. Networks can be connected using wired technologies like Ethernet cables or wireless technologies such as Wi-Fi.
Example: The office network included both wired desktop computers and Wi-Fi access for mobile devices.
The process of discovering devices, users, and services on a network, often as part of reconnaissance by attackers.
Example: An attacker scans a corporate network to find active devices and potential vulnerabilities.
The capture, analysis, and investigation of network traffic to identify security incidents or breaches.
Example: After a data breach, analysts review network logs to trace the source of the attack.
A hardware component that connects a computer or device to a network, enabling communication over wired or wireless connections.
Example: The technician installed a new NIC to upgrade the computer's network capabilities.
Measures taken to protect a computer network from unauthorised access or harm.
Example: The company invested in network security to prevent breaches.
Dividing a computer network into smaller, isolated segments to enhance security and limit the spread of threats.
Example: A company separates its customer database from its employee network so that a breach in one area doesn't affect the other.
The process of capturing and analysing data packets on a network to identify potential threats or gather information.
Example: A security analyst uses a network sniffer to detect unauthorised data transfers.
A hardware device that connects devices on a local area network (LAN) and uses MAC addresses to forward data to the correct destination.
Example: The office network uses a switch to connect multiple computers and printers for efficient communication.
A connection point within a network, such as a computer or device.
Example: Each printer and workstation is a node in the network.
A high-speed interface protocol for accessing solid-state drives connected via PCIe, providing faster data transfer rates.
Example: The new laptop featured an NVMe SSD for rapid file loading.
An open standard for access delegation, allowing secure access to resources without sharing passwords.
Example: A user grants a project management app permission to access their cloud storage account using OAuth, enabling the app to fetch and display relevant files without requiring the user's login credentials.
A copy of data that is stored at a different physical location from the original, used to protect against data loss due to disasters, theft, or hardware failure.
Example: The company regularly performs off-site backups to cloud storage to ensure data safety.
See also: Backup
Not connected to the internet or a network.
Example: He worked offline while travelling without Wi-Fi.
Connected to the internet or a network.
Example: Students submitted their assignments online through the portal.
System software that manages computer hardware and software resources, providing a platform for applications to run and offering user interfaces for interaction. Examples include Windows, macOS, and Linux.
Example: The laptop's operating system was upgraded to the latest version for better performance.
A small unit of data transmitted over a network, containing both the payload (the actual data) and control information such as source and destination addresses.
Example: The video was streamed by sending thousands of data packets over the internet.
A firewall technique that controls the flow of data packets based on predefined security rules, such as IP addresses and ports.
Example: A firewall blocks packets from an unknown IP address trying to access the company network.
Packet Loss occurs when data packets travelling across a network fail to reach their destination, which can result in reduced performance, delays, or interruptions.
Example: During a video call, the user experienced audio issues due to packet loss caused by an unstable internet connection.
See also: Packet
PageRank is an algorithm developed by Google to rank web pages in search results based on the number and quality of links to the page.
Example: The university's main page has a high PageRank due to many trusted sites linking to it.
A Page View is a metric that counts each time a web page is loaded or reloaded in a browser, used to measure website traffic and user engagement.
Example: The business website received over 5,000 page views during the first week of its new campaign.
A secret string of characters used to authenticate a user.
Example: He changed his password after a security alert.
See also: Credentials, Password Manager
A software tool that securely stores and generates strong, unique passwords for different accounts.
Example: An employee uses a password manager to create and store unique, complex passwords for each of their work-related accounts, ensuring they don't need to remember every password individually.
See also: Password, Credentials
A set of rules designed to create strong, secure passwords and enforce regular password changes.
Example: A company requires employees to use passwords with at least 12 characters, including numbers and symbols.
A software update designed to fix security vulnerabilities, bugs, or performance issues.
Example: Microsoft releases a patch to address a security flaw in Windows, which users need to install to stay protected.
The process of regularly updating software to fix security vulnerabilities, bugs, and performance issues.
Example: An IT team applies a security patch to operating systems and applications each month to protect against newly discovered vulnerabilities.
See also: Patch
The second Tuesday of each month when Microsoft releases security updates for its software.
Example: IT departments schedule updates on Patch Tuesday to ensure systems stay secure.
See also: Patch, Patch Management
The component of malicious software (malware) responsible for executing the intended harmful action, such as data theft, system damage, or unauthorised access, once the malware has infiltrated a system.
Example: A ransomware payload encrypts files on a victim's computer and displays a ransom note demanding payment to restore access.
A set of security standards for protecting credit card data during processing, storage, and transmission.
Example: Online retailers must comply with PCI DSS to ensure customer payment information is secure.
PCI Express (PCIe) is a high-speed serial computer expansion bus standard designed to replace older PCI, PCI-X, and AGP standards, offering faster data transfer rates.
Example: A gamer upgrades their computer by installing a new graphics card into a PCI Express x16 slot to improve performance.
A file format used to present documents consistently across devices.
Example: She emailed her résumé as a PDF file.
A unit of digital information equal to exactly 1,024TiB. (1024 tebibytes.) There is no confusion with how big a pebibyte (PiB) is as there could be with a petabyte (PB). Therefore, PiB is the more correct term to use.
Example: 1PiB is really really large.
See also: Petabyte (PB), Tebibyte (TiB)
A network model where computers, called peers, connect directly to each other to share resources without relying on a central server.
Example: File sharing apps often use peer-to-peer networks.
A cyber security professional who performs authorised hacking on an organisation's systems, networks, or applications to identify and help fix security vulnerabilities.
Example: A financial institution hires a penetration tester to attempt to break into its online banking platform. The tester discovers a vulnerability that allows unauthorised access to customer accounts and provides a report with recommendations to fix the issue.
See also: Penetration Testing
A simulated cyber attack performed by security experts (ethical hackers) to identify vulnerabilities in a system or network.
Example: A company hires a penetration tester to attempt to break into their network, uncovering weak points that need to be secured.
See also: Penetration Tester
An external device connected to a computer to provide input, output, or storage functionality.
Example: A mouse and keyboard are common peripherals used to interact with a desktop computer.
A unit of digital information equal to 1,024TB (1024 terabytes) in most computing contexts, however disk drive manufacturers use it to mean 1,000,000,000,000 bytes in order to report larger storage capacities.
Example: 1PB is really really large.
See also: Pebibyte (PiB), Terabyte (TB)
A cyber attack that redirects users from legitimate websites to fraudulent ones to steal personal information. Unlike phishing, pharming can occur even if the user types the correct URL.
Example: You enter your bank's web address, but malware on your device redirects you to a fake version of the site, prompting you to enter your login credentials.
A social engineering attack where cyber criminals send fraudulent emails or messages designed to trick recipients into revealing sensitive information or clicking malicious links.
Example: You receive an email claiming to be from your bank, asking you to click a link and enter your account details, but the link leads to a fake website.
PHP is a widely-used open-source scripting language suited for web development and embedded in HTML to create dynamic web pages.
Example: The developer used PHP to build a web application.
See also: HTML, Website, Web Application
Hacking into telecommunication systems, often to make free calls or exploit phone networks.
Example: In the early days of phone hacking, phreakers used tones to bypass long-distance call charges.
Measures designed to protect physical assets, such as buildings, servers, and devices, from theft, damage, or unauthorised access.
Example: Installing CCTV cameras and secure entry systems to protect a data centre.
A network utility that tests connectivity between two devices by sending ICMP echo requests and measuring response time.
Example: The technician pings google.com to verify that the internet connection is active on the client’s machine.
See also: ICMP
The smallest unit of a digital image or display, representing a single point of colour. Multiple pixels combine to form images on screens.
Example: The photograph had a resolution of 1920 by 1080 pixels.
A hardware or software environment in which applications run. This can include operating systems, cloud services, or hardware devices.
Example: The app was developed for both Android and iOS platforms.
See also: Operating System
A raster image file format that supports lossless compression and transparency, often used for web graphics and digital images requiring high quality.
Example: She saved the logo as a PNG to preserve its transparency on the website.
A series of spoken-word digital audio files made available online.
Example: She listens to a weekly podcast on Australian tech news.
A small window that appears automatically on a computer screen, often used for advertisements, notifications, or additional information.
Example: The website displayed a pop-up offering a discount code.
A standard email protocol used to retrieve emails from a mail server to a local device. POP3 downloads the messages and usually deletes them from the server after download.
Example: She configured her email client to use POP3 so that her messages would be stored on her laptop and not kept on the server.
See also: IMAP, Mail Server
A numerical identifier in networking used to direct data to specific applications or services on a device. Ports enable multiple programs to use the network simultaneously without interference.
Example: The firewall blocked external access to port 21.
A technique used to identify open ports and services on a network, often as a reconnaissance step before an attack.
Example: Hackers scan a company's network for open ports to find vulnerable services.
This is a diagnostic testing sequence run by a computer's BIOS when the machine is powered on to check hardware components such as RAM, CPU, and storage devices.
Example: When a user turns on their PC and hears a single beep, it indicates the POST has completed successfully.
Power Cycle is the process of turning a device off and then back on again to reset or troubleshoot hardware or software issues.
Example: The user performs a power cycle on the modem to resolve a connection issue.
A social engineering tactic where attackers create a fabricated scenario or pretext to trick individuals into divulging confidential information.
Example: An attacker calls an employee, claiming to be from IT support, and convinces them to share their login credentials to "fix a technical issue."
A Printer is a peripheral device that produces a physical copy of digital documents, images, or text onto paper.
Example: The office printer is used to generate hard copies of monthly financial reports.
See also: Peripheral, Hardware
A secret cryptographic key used to decrypt data or create digital signatures, kept confidential by its owner to ensure security.
Example: Only the recipient can decrypt the message with their private key.
See also: Public Key, Encryption
Exploiting vulnerabilities to gain higher access rights within a system than originally granted, enabling attackers to perform unauthorised actions.
Example: A user with standard access exploits a vulnerability to gain administrator privileges, allowing them to install software or access sensitive files.
A Process is an instance of a program that is executing on a computer, including its current activity and system resources being used.
Example: The task manager shows several running processes, including one for the web browser.
Protective DNS (PDNS) is a security service that analyses and filters DNS queries to prevent access to malicious domains. It blocks connections to phishing sites, malware command-and-control servers, and other cyber threats before they can cause harm.
Example: An employee accidentally clicks on a phishing link in an email. However, the company's PDNS service detects that the domain is linked to known phishing activity and blocks the request, preventing the user from accessing the harmful website.
A set of rules for data communication between devices.
Example: HTTP and FTP are common internet protocols.
A server or service that acts as an intermediary between a user's device and the internet, used to improve security, privacy, or performance.
Example: They used a proxy to access region-locked content.
A hardware component that converts electrical power from an outlet into usable power for a computer's internal components.
Example: The PSU failed, causing the computer to shut down unexpectedly.
A Public IP Address is an IP address that is assigned to a device for direct access over the internet, allowing it to communicate with other internet-connected devices.
Example: An Australian web server uses a public IP address so that users around the world can access the hosted website.
See also: IP Address
A cryptographic key shared openly to encrypt data or verify digital signatures, paired with a private key in asymmetric encryption.
Example: The sender used the public key to encrypt the file.
See also: Private Key, Encryption
A group of cyber security professionals that integrates the functions of both the Red Team (attackers) and Blue Team (defenders) to enhance an organisation's security posture. The Purple Team facilitates collaboration and information sharing between the Red and Blue Teams to identify vulnerabilities, improve defences, and ensure effective threat mitigation. Their role is to ensure that offensive testing (Red Team) directly informs defensive strategies (Blue Team).
Example: After the Red Team conducts a simulated phishing attack and successfully compromises user credentials, the Purple Team helps the Blue Team improve email filtering and employee training to prevent future incidents.
Quality of Service (QoS) is a networking feature that prioritises certain types of traffic to ensure reliable performance, especially for time-sensitive data like voice or video.
Example: The network administrator enabled QoS to prioritise video conferencing traffic over general web browsing in the office.
A type of two-dimensional barcode that stores data and can be scanned using a smartphone or other camera-enabled device to quickly access information such as URLs, contact details, or other information.
Example: The restaurant menu was available by scanning a QR code on the table.
A method of encrypting data using principles of quantum mechanics to ensure secure communication that is resistant to hacking.
Example: Quantum key distribution is used to exchange encryption keys securely between two parties.
The process of isolating infected files, devices, or systems to prevent the spread of malware or other security threats.
Example: Antivirus software detects a suspicious file and places it in quarantine, preventing it from affecting other parts of the system.
A request for data or information from a database.
Example: She ran a query to find all orders from July.
QWERTY is the standard keyboard layout used for English-language typewriters and computers, named after the first six letters on the top row of keys.
Example: Most Australian users type on a QWERTY keyboard layout when using laptops and desktop computers.
A data storage technology that combines multiple physical drives to improve performance, redundancy, or both.
Example: The server used RAID 5 to protect data against drive failures.
A type of temporary computer memory that stores data and instructions currently in use, allowing quick access by the processor. RAM is cleared when the device is turned off.
Example: Adding more RAM improved the computer's performance.
A type of malware that encrypts a user's data or system, with attackers demanding payment (ransom) to restore access.
Example: An employee opens a malicious email attachment, causing ransomware to encrypt company files until a ransom is paid.
See also: Malware
A Raspberry Pi is a low-cost, credit card-sized single-board computer developed in the UK, widely used for education, hobbyist projects, and prototyping.
Example: An Australian student uses a Raspberry Pi to build a weather monitoring station for a school project.
See also: Hardware
Malware that allows attackers to remotely control an infected system, often used for surveillance or data theft.
Example: An attacker uses a RAT to activate a victim's webcam and monitor their activity.
To restart a computer system.
Example: She had to reboot her laptop after a software update.
A Reciprocal Link is when two websites agree to link to each other, often to improve SEO or drive mutual traffic.
Example: Two Australian blogs added reciprocal links to boost visibility and support each other's content.
The process of forwarding users from one URL to another.
Example: Visitors to the old site are redirected to the new domain.
A group of security professionals that simulates real-world attacks on an organisation to test its defences and identify vulnerabilities.
Example: The red team launches a mock phishing campaign to see if employees will click malicious links, helping improve training and awareness.
See also: Blue Team, Purple Team
The ability to connect to and use a computer or network from a different location through the internet or another network, often for administration, support, or telework.
Example: IT staff use remote access to troubleshoot employee computers.
An attack where valid data is captured and resent to trick a system into unauthorised actions.
Example: An attacker intercepts and replays a login request to gain access to a secure system.
See also: Wormhole Attack
A central location where data or software code is stored and managed.
Example: The source code was stored in a GitHub repository.
A website designed and created to adapt its layout and content automatically based on the user's device screen size and orientation.
Example: The local council's responsive website works well on both desktop computers and mobile devices.
See also: Website
The process of identifying, analysing, and evaluating potential security risks to determine their impact and the steps needed to mitigate them.
Example: A company performs a risk assessment to identify vulnerabilities in its network and prioritises fixing the most critical issues.
See also: Vulnerability Assessment
The process of reducing the likelihood or impact of security threats through proactive measures and controls.
Example: Encrypting sensitive data and enforcing strong passwords to mitigate the risk of data breaches.
A software solution that allows IT service providers to remotely monitor, manage, and maintain an organisation's IT infrastructure, including computers, servers, and networks.
Example: An IT provider uses RMM software to monitor the health of a client's servers, automatically deploying security patches and detecting hardware failures before they cause downtime.
An unauthorised Wi-Fi access point installed on a network, often used by attackers to intercept traffic.
Example: A hacker sets up a rogue access point in a coffee shop to steal data from users who connect.
A type of non-volatile storage in a computer that contains permanent data and instructions, which cannot be easily modified or erased by the user.
Example: The computer's firmware is stored in ROM, ensuring it remains intact even when powered off.
Malicious software that grants attackers deep access to a system while hiding its presence, making it difficult to detect.
Example: A rootkit infects a computer and allows an attacker to control the system remotely without the user knowing.
See also: Malware
A networking device that forwards data packets between computer networks, typically connecting a local network to the internet and managing traffic within the network.
Example: They reset the router to fix the Wi-Fi connection.
A web feed format that allows users to receive automatic updates from websites, blogs, or news sources in a standardised format.
Example: She subscribed to an RSS feed for local news.
Cloud-based software model where applications are hosted by a provider and accessed over the internet, typically by subscription.
Example: The accounting system is provided as SaaS.
A high-speed network that provides access to consolidated block-level storage, typically used in data centres.
Example: A Sydney-based data centre uses a SAN to provide scalable and reliable storage to multiple servers.
An isolated environment used for testing or running untrusted programs.
Example: The antivirus placed the suspicious file in a sandbox.
A security technique that isolates applications, processes, or files in a controlled environment to prevent them from affecting the main system. This method allows security professionals or systems to test or analyse suspicious code safely without risking harm to the primary network or data.
Example: Before deploying a new software update, the IT team runs it in a sandbox environment to check for potential vulnerabilities or compatibility issues.
An interface used to connect storage devices like hard drives and SSDs to a computer's motherboard.
Example: The hard drive was connected to the motherboard via a SATA cable.
A set of instructions written for a program to automate tasks.
Example: The login script checks user credentials against a database.
A set of standards for connecting and transferring data between computers and peripheral devices.
Example: An older server uses a SCSI interface to connect to external tape backup devices.
See also: Hardware
A broadband internet connection that provides equal upload and download speeds.
Example: A business uses SDSL to support video conferencing and file uploads with consistent performance.
See also: Broadband, ADSL, NBN
A software system that searches the internet or a database for information based on keywords or phrases entered by a user, returning a list of relevant results.
Example: She used a search engine to find a web designer on the Gold Coast.
A security feature that ensures a device only boots using software trusted by the manufacturer.
Example: If malware tries to alter your computer's boot process, Secure Boot prevents the system from starting.
A thorough review and evaluation of an organisation's security policies, systems, and procedures to identify vulnerabilities, ensure compliance with security standards, and verify the effectiveness of security controls.
Example: A company conducts a security audit to ensure that client records are securely stored, employee devices have up-to-date antivirus software, and access to sensitive files is restricted to authorised staff only.
Programmes designed to educate employees on recognising and preventing cyber security threats, such as phishing and social engineering attacks.
Example: Employees attend a training session on how to identify suspicious emails and avoid falling for phishing scams.
The overall strength of an organisation's security measures and its readiness to respond to threats.
Example: A company with strong security policies, regular training, and robust defences has a good security posture.
The page displayed by a search engine in response to a user's query, listing relevant links.
Example: The company's website appeared at the top of the SERP after a user searched for its product.
See also: Search Engine
A computer system that provides services or resources to other devices on a network.
Example: The website is hosted on a secure server.
A temporary connection between a user and a system, website, or application that begins when the user logs in or starts interacting and ends when they log out or become inactive.
Example: The user's session expired after 10 minutes of inactivity.
An attack where an attacker takes over an active user session to gain unauthorised access to data or services.
Example: An attacker intercepts a user's session token to gain access to their email account.
A unique identifier issued to a user during a session to maintain authentication and track activity.
Example: When you log into a website, a session token keeps you logged in until you sign out.
The use of unauthorised applications, devices, or services within an organisation, often leading to security risks.
Example: Employees using personal cloud storage accounts to share work files without IT approval.
An attack that exploits indirect information, such as power consumption or timing data, to extract sensitive information.
Example: Analysing the power usage of a device to determine encryption keys.
A security solution that collects, analyses, and correlates log data from various systems to identify security threats, ensure compliance, and provide real-time incident alerts.
Example: A retail company uses a SIEM system to monitor login attempts across all its branches, detecting an unusual spike in failed login attempts from foreign IP addresses, indicating a potential brute-force attack.
A type of phishing attack delivered via SMS text messages, often tricking users into clicking malicious links.
Example: A text message claims your package delivery failed and asks you to click a link to reschedule, which installs malware.
See also: Phishing
A standard communication protocol used to send emails from a client to a server or between servers. It handles the delivery of outgoing email messages.
Example: The email client used SMTP to send the message to the recipient's mail server.
See also: Mail Server
A centralised team that monitors, detects, and responds to security incidents in real time.
Example: A bank's SOC monitors its network 24/7 to detect and respond to cyber threats.
Manipulating people into performing actions or divulging confidential information by exploiting human psychology rather than technical vulnerabilities.
Example: An attacker calls an employee, pretending to be from IT support, and tricks them into revealing their password.
The programs and operating systems that run on computer hardware and perform specific tasks or functions.
Example: Libre Office is software used for word processing.
Unsolicited and often irrelevant emails or messages, usually sent in bulk for advertising purposes or to spread malware.
Example: Your inbox fills up with emails offering fake lottery winnings or dubious investment opportunities.
A highly targeted phishing attack aimed at a specific individual or organisation, often using personalised details to appear more convincing.
Example: You receive an email that appears to be from your manager, asking you to download an urgent file, which actually contains malware.
See also: Phishing
An email authentication protocol that allows domain owners to specify which mail servers are authorised to send emails on behalf of their domain. It helps prevent email spoofing and phishing.
Example: A company sets up an SPF record in its DNS to specify that only its official mail servers can send emails using its domain.
Malicious software that secretly gathers information about a user's activities without their knowledge, often to steal sensitive data.
Example: Spyware installed on a smartphone monitors calls, messages, and location, sending the data to an attacker.
See also: Malware
A programming language used to manage and manipulate relational databases.
Example: An analyst writes an SQL query to retrieve customer data from a company's database.
See also: MySQL
A type of attack where malicious SQL code is inserted into a database query to manipulate or steal data.
Example: An attacker enters specially crafted input into a website's login field to bypass authentication and access the database.
A storage device that uses flash memory to store data, offering faster access speeds and greater durability compared to traditional hard drives.
Example: Installing an SSD significantly reduced the computer's boot time.
SSL (Secure Sockets Layer) = A cryptographic protocol designed to establish a secure and encrypted connection between two systems over a network. SSL ensures that data transmitted between these systems remains confidential, authenticated, and protected from interception or tampering. While commonly associated with securing communication between web browsers and web servers (HTTPS), SSL can also secure email communications, file transfers, instant messaging, and other network services. Although SSL has been largely replaced by its successor, TLS (Transport Layer Security), the term "SSL" is still widely used to refer to secure communication protocols.
Example: When you see a padlock icon in your browser's address bar, it indicates the website is using SSL/TLS encryption.
See also: TLS, SSL Certificate
A digital certificate that authenticates a website's identity and enables encrypted connections.
Example: They installed an SSL certificate to secure their online store.
An IP address that is manually assigned to a device and does not change over time. Static IP addresses are often used for servers, network equipment, or any device that needs a consistent address for reliable access.
Example: The business assigned a static IP address to its web server to ensure consistent remote access.
See also: IP Address, Dynamic IP Address
The practice of hiding secret information within other non-suspicious data, such as images or audio files.
Example: Someone embeds a confidential message within an image file and sends it via email. Only the intended recipient, who knows how to extract the hidden text, can read the message.
To transmit or receive audio, video, or other media content continuously over the internet without requiring the entire file to be downloaded beforehand.
Example: They streamed the live concert on their smart TV.
A logically segmented portion of a larger network, used to improve performance and manageability by dividing IP address space.
Example: The IT department creates a subnet for the accounting team to isolate their network traffic from other departments.
See also: Network
A Subnet Mask is a 32-bit number used in IP networking to divide an IP address into network and host portions, helping determine which devices are on the same local network.
Example: The technician configured the router with a subnet mask of 255.255.255.0 to define the local network range.
Tailgating (also known as piggybacking) is a physical security breach where an unauthorised person follows an authorised person into a restricted area without proper authentication.
Example: An attacker carrying a box pretends to be a delivery person and waits near a secure office entrance. When an employee enters using their access card, the attacker walks in behind them without swiping a card, gaining unauthorised access to the building.
A unit of digital information equal to exactly 1,024GiB. (1024 gibibytes.) There is no confusion with how big a tebibyte (TiB) is as there could be with a terabyte (TB). Therefore, TiB is the more correct term to use.
Example: Because of the way drive manufacturers represent terabytes, a 1TB drive only contains 931GiB of storage space.
See also: Terabyte (TB), Gibibyte (GiB)
A unit of digital information equal to 1,024GB (1024 gigabytes) in most computing contexts, however disk drive manufacturers use it to mean 1,000,000,000 bytes in order to report larger storage capacities.
Example: Because of the way drive manufacturers represent terabytes, a 1TB drive only contains 931GB of storage space.
See also: Tebibyte (TiB), Gigabyte (GB)
Terminal is a command-line interface used in Unix-like systems such as Linux and macOS to interact with the operating system through text commands.
Example: A Linux user opens the Terminal and types commands to update system packages.
See also: CLI
The process of identifying potential security threats through monitoring, analysis, and automated tools.
Example: An antivirus program detects malware on a computer and alerts the user to take action.
The proactive process of searching for cyber threats or attackers within a network, often using advanced tools and techniques to identify hidden threats.
Example: A security analyst reviews system logs and network traffic to detect unusual activity that may indicate a hidden attack.
Information and analysis about current or potential cyber threats to help organisations proactively defend against attacks.
Example: Security teams use threat intelligence reports to stay aware of new ransomware variants targeting their industry.
The process of identifying, evaluating, and mitigating potential security threats to systems, applications, or networks.
Example: A development team performs threat modelling to identify potential risks in a new application and plan countermeasures.
The total sum of all possible vulnerabilities, entry points, or attack vectors in a system that an attacker could exploit.
Example: A company identifies its threat surface as including its website, email server, customer database, employee laptops and devices, point-of-sale (POS) systems, Wi-Fi network, cloud services, cloud storage, and remote work tools.
The method or pathway used by an attacker to exploit a vulnerability and gain unauthorised access to a system or network.
Example: Phishing emails and infected USB drives are common threat vectors used to deliver malware to an organisation's network.
A flexible and high-quality raster image format commonly used for storing detailed graphics, photographs, and scanned images. TIFF files support lossless compression and multiple layers or pages.
Example: The graphic designer used the TIFF format to save high-resolution scans of the artwork for print.
TLS (Transport Layer Security) = A cryptographic protocol designed to provide secure and encrypted communication between two systems over a network. TLS ensures data confidentiality, integrity, and authentication during transmission, protecting it from interception, tampering, or forgery. TLS is the successor to SSL (Secure Sockets Layer) and offers improved security, stronger encryption algorithms, and better performance. It is widely used to secure web traffic (HTTPS), email communications, file transfers, instant messaging, and other network-based services.
Example: Websites with HTTPS use TLS to protect data during transactions, such as online banking or shopping.
See also: SSL
A digital object used to authenticate users and grant access to systems or services. Tokens can be hardware-based or software-based.
Example: When logging into a secure system, a user may receive a one-time token via a mobile app for verification.
The process of replacing sensitive data, like credit card numbers, with unique tokens that have no exploitable value, enhancing security.
Example: When making an online payment, your credit card number is replaced by a token so the actual data isn't stored on the retailer's server.
The process of monitoring and examining network traffic to detect patterns, anomalies, or potential security threats.
Example: Analysts notice an unusual amount of data being sent to an external server, indicating potential data exfiltration.
A hidden method within software that allows bypassing security controls, often planted by developers or attackers.
Example: An unethical programmer adds a trapdoor to a system so they can access it secretly after it's deployed.
A type of malware (malicious software) that appears to be legitimate or useful but, once installed, performs hidden malicious activities, such as stealing data, installing additional malware, or providing remote access to attackers.
Example: A user downloads what appears to be a free software program, but once installed, it secretly allows attackers to remotely control the computer.
The process of sending data through a secure, encrypted channel within a network, often used in VPNs.
Example: A remote worker uses a VPN to tunnel their internet traffic securely through the company's network.
See also: VPN
A type of cyber attack where attackers register domain names similar to popular websites to trick users into visiting malicious sites.
Example: A fake website called "gogle.com" is set up to steal login details from users who mistype the real "google.com."
A security feature that helps prevent unauthorised changes to a system by prompting users for permission when actions require administrative privileges.
Example: When you try to install new software on your computer, UAC asks you to confirm the action to prevent malicious installations.
A modern firmware that initializes hardware during the boot process and provides an interface between the operating system and platform firmware, replacing the legacy BIOS.
Example: A new laptop uses UEFI to support faster boot times and larger hard drives compared to older BIOS systems.
A solution that manages and secures all types of endpoint devices, such as laptops, mobiles, and tablets, from a single platform.
Example: An IT team uses UEM software to enforce security policies and push updates to all employee devices.
See also: Endpoint
User Interface (UI) is the visual and interactive part of a software application or device that users interact with, including elements like buttons, menus, and layouts.
Example: The design team updated the UI of the mobile banking app to make it cleaner and more user-friendly for customers.
See also: UX
The process of sending data from a local device to a remote server or system over a network, typically the internet.
Example: She uploaded her resume to the job application website.
See also: Download
A device that provides backup power to electronic equipment in case of a power outage, allowing time for safe shutdown.
Example: The UPS kept the server running during a brief blackout.
See also: Peripheral, Hardware, PSU
The address used to access resources on the internet, such as web pages, images, or files.
Example: The URL for our website is: https://www.digitaldreams.com.au
A standard interface for connecting peripherals such as keyboards, mice, and storage devices to a computer.
Example: He transferred files using a USB flash drive.
A unique identifier used in combination with a password to authenticate a user when accessing a computer system or service.
Example: To log into the university portal, a student must enter their assigned username and password.
See also: Credentials
A security solution that integrates multiple protective measures, such as firewall, antivirus, and intrusion detection, into a single platform.
Example: A small business uses a UTM device to protect its network from malware, phishing, and unauthorised access.
User Experience (UX) refers to a person's overall experience and satisfaction when interacting with a product, system, or service, especially in terms of ease of use and efficiency.
Example: The development team focused on improving UX by redesigning the interface to make navigation more intuitive.
See also: UI
The process of creating virtual versions of hardware, storage, or networks to improve efficiency and security.
Example: A server hosts multiple virtual machines to allow different operating systems to run simultaneously.
See also: VM (Virtual Machine)
Malicious code that attaches itself to legitimate files and spreads when the infected file is executed, causing harm to systems or data.
Example: You open a file attachment from an unknown sender, and it infects your computer with a virus that deletes important files.
Voice-based phishing where attackers use phone calls to trick individuals into providing sensitive information.
Example: A scammer calls, pretending to be from your bank, and asks for your account details to "verify your identity."
See also: Phishing
A Virtual Local Area Network (VLAN) is a logical grouping of devices on the same physical network that are segmented into separate broadcast domains for improved management and security.
Example: The IT team created separate VLANs for staff and student devices within the school network to enhance security and control.
A software-based simulation of a physical computer that allows multiple operating systems to run on the same hardware.
Example: Developers use a virtual machine to test a new application on Windows while running a Mac.
See also: Virtualisation
A technology that securely extends a private network across a public network, allowing users or multiple networks to connect as if they were directly linked to the private network. A VPN creates an encrypted tunnel that protects data integrity and confidentiality while in transit. This enables remote users to securely access private resources and allows organisations to securely connect multiple office locations over the internet.
Example: A company uses a VPN to connect its headquarters' network with branch offices, allowing employees to share resources and data securely between locations.
See also: Tunnelling, VPN Service
A commercial offering provided by third-party companies that allows users to encrypt their internet traffic, mask their IP address, bypass geographical restrictions, or attempt to maintain privacy while browsing the internet. However, while a VPN service can help protect data in transit and obscure a user's location, it carries its own risks and does not guarantee complete anonymity or security from all types of cyber threats.
Example: A user subscribes to a VPN service to encrypt their internet connection while using public Wi-Fi at an airport, preventing potential attackers from intercepting their sensitive information.
See also: VPN
A virtual machine sold as a service by a hosting provider, offering more control and resources than shared hosting.
Example: A developer deployed a web app on a VPS to have full control over the server configuration.
See also: Hosting
A weakness or flaw in a system, network, or software that can be exploited by attackers to gain unauthorised access or cause damage.
Example: An outdated version of a web browser with unpatched vulnerabilities allows an attacker to install malware on your device.
The systematic process of identifying and evaluating weaknesses in a system or network to determine potential risks.
Example: An IT team conducts a vulnerability assessment and finds outdated software that needs patching.
See also: Risk Assessment
The ongoing process of identifying, assessing, prioritising, and remediating security vulnerabilities in systems.
Example: An IT team scans the network on a weekly basis for vulnerabilities and applies patches to keep systems secure.
A security tool that monitors and filters HTTP traffic to protect web applications from attacks like SQL injection and cross-site scripting.
Example: A WAF blocks malicious requests attempting to exploit a vulnerability in an online application.
A Wide Area Network (WAN) is a network that connects computers and other devices across large distances, often using public or private communication links to span cities, states, or countries.
Example: A large business in Australia uses a WAN to connect its branch offices across different states.
An attack where hackers compromise websites frequently visited by their target audience to infect visitors with malware.
Example: A hacker infects a popular industry forum with malware, knowing employees from specific companies frequently visit the site.
Embedding identifying information into digital content to trace ownership or detect unauthorised use.
Example: A photographer adds a watermark to their images to prevent unauthorised copying.
A web application is a software program that runs on a web server and is accessed through a browser over the internet.
Example: The Australian Taxation Office provides a web application for users to lodge their tax returns online.
Web filtering is a broader security measure that controls access to websites based on content categories, reputation, or security risks. It can use DNS filtering, URL filtering, and content analysis to block harmful or non-compliant web traffic.
Example: A school uses web filtering to prevent students from accessing adult content, social media, and gaming sites during school hours while allowing educational resources.
See also: Protective DNS (PDNS), DNS Filtering
A modern image format developed by Google that provides superior compression for images on the web, supporting both lossy and lossless compression as well as transparency and animation.
Example: The website used WebP images to reduce page load times without sacrificing visual quality.
A web page is a single document on the internet written in HTML and viewed in a browser, forming part of a website.
Example: The web page displayed details about upcoming community events in Brisbane.
See also: Website
The automated extraction of data from websites, which can be used for legitimate purposes or malicious activities.
Example: A company scrapes product prices from competitors' websites to adjust their pricing strategy.
A website is a collection of related web pages accessible under a single domain, hosted on a server and available via the internet.
Example: The Australian Bureau of Statistics maintains a website with national data and reports.
See also: Web Page
A type of phishing attack that targets high-level executives or decision-makers within an organisation to steal sensitive information.
Example: A cybercriminal sends a convincing email to a CEO, impersonating a supplier and requesting a large wire transfer.
See also: Phishing
A security testing method where the tester has full knowledge of the system's internal structure, code, and logic.
Example: Developers perform white box testing on new software to identify and fix security flaws in the code.
An ethical hacker who uses their skills to identify and fix security vulnerabilities in systems, helping organisations improve security.
Example: A company hires a white hat hacker to conduct a security audit and discover weaknesses before malicious hackers do.
See also: Black Hat Hacker, Hacker
A security strategy where only explicitly approved applications, users, IP addresses, or processes are allowed access to a system, network, or resource. Everything not included on the whitelist is automatically blocked by default, reducing the attack surface and limiting potential threats.
Example: A company's IT department whitelists specific software applications on employee computers, ensuring that only approved programs can run on the network.
See also: Blacklisting
A wireless networking technology that allows devices to connect to the internet or a network without physical cables.
Example: The cafe offered free Wi-Fi for customers to browse the internet.
A WiFi Pineapple is a network auditing tool used for penetration testing wireless networks by mimicking legitimate WiFi access points and intercepting traffic.
Example: A cyber security consultant uses a WiFi Pineapple to test for vulnerabilities in a corporate wireless network.
See also: Wi-Fi
Protective measures to secure wireless networks, such as encryption, passwords, and authentication protocols.
Example: Enabling WPA3 encryption on your home Wi-Fi network to prevent unauthorised access.
A type of malware that replicates itself and spreads to other devices, often causing widespread network disruption.
Example: The "ILOVEYOU" worm spread through email attachments, infecting millions of computers worldwide by replicating itself.
A network security attack where an attacker captures data packets at one location in a network, tunnels them to another location, and then replays them, disrupting communication or bypassing security measures. This attack is commonly seen in wireless networks, such as ad hoc or sensor networks.
Example: In a corporate Wi-Fi network, an attacker sets up rogue devices to intercept data packets from employees' laptops, tunnels them to a remote server, and replays them to gain unauthorised access to confidential business data.
See also: Replay Attack
A security protocol designed to protect wireless networks by encrypting data and ensuring secure communication.
Example: WPA3 encryption is used on home Wi-Fi routers to prevent unauthorised access.
An advanced security solution that integrates multiple security layers (such as endpoint, network, cloud, and email security) into a unified platform to provide enhanced threat detection and response capabilities.
Example: An XDR platform detects a phishing email sent to an employee, tracks the related network activity, and automatically blocks any malicious connections to prevent data exfiltration.
An attack that targets a vulnerability unknown to the software vendor, giving them "zero days" to provide a fix.
Example: An attacker discovers a flaw in a web browser and uses it to steal data before a patch is released.
A security model where no user or device is trusted by default, requiring continuous verification for access to resources.
Example: Employees must verify their identity each time they access company systems, even when working from the office.
A device that has been compromised by malware and is controlled remotely by an attacker, often used in botnets for cyber attacks.
Example: A hacker uses thousands of zombie computers to launch a Distributed Denial-of-Service (DDoS) attack on a website.
See also: Botnet
A process that has completed execution but still remains in the system's process table, consuming system resources.
Example: After a program crashes, its zombie process lingers and takes up system memory.
A text file stored on a DNS server that contains mappings between domain names and IP addresses within a domain.
Example: The administrator edited the zone file to update the A record for the organisation's domain.
See also: DNS, Name Server