A physical space where business is performed. For example, a facility can be a building, a floor of a building or a designated space on the floor of a building.
A physical space where business is performed. For example, a facility can be a building, a floor of a building or a designated space on the floor of a building.
Sending counterfeit email by using a legitimate sender's address without their knowledge.
A trader that is in not legitimate.
Websites that are not legitimate.
A device that allows copies of documents to be sent over a telephone network.
A particularly lightweight thread of execution. Like threads, fibres share address space. However, fibres use cooperative multitasking while threads use pre-emptive multitasking.
Federal Information Processing Standard
A network device that filters incoming and outgoing network data based on a series of rules.
Software embedded in IT equipment or OT equipment.
An intelligence sharing partnership between Australia, Canada, New Zealand, the United Kingdom and the United States of America.
A specific type of electrically erasable programmable read-only memory.
Computer software for using content created with Adobe Flash, including viewing multimedia content, executing rich internet applications, and streaming audio and video.
A defect, fault or imperfection, especially one that is hidden or unknown.
A lead that connects IT equipment to the fixed infrastructure of a facility. For example, the lead that connects a workstation to a network wall socket.
A person who is not an Australian citizen.
A system that is not managed by, or on behalf of, the Australian Government.
Intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.
Fuzzing (or fuzz testing) is a method used to discover errors or potential vulnerabilities in software.