A portable computer that uses a touch screen as its primary input device. Most tablets are slightly smaller and lighter than the average laptop.
A portable computer that uses a touch screen as its primary input device. Most tablets are slightly smaller and lighter than the average laptop.
When an individual or business willfully and intentionally falsifies information on a tax return to limit their tax liability.
The transfer of signals over distances.
The automatic measurement and transmission of data collected from remote sources. Such data is often used within systems to measure the use, performance and health of one or more functions or devices that make up the system.
A device that is used for point-to-point communication over a distance. This includes digital and IP telephony.
A system designed primarily for the transmission of voice communications.
A short name referring to investigations and studies of compromising emanations.
IT equipment that has been specifically designed to minimise TEMPEST emanations.
An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime.
Traffic Light Protocol
Recipients can spread this to the world, there is no limit on disclosure. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction.
A device that has been configured to automatically filter and control the flow of data.
The Traffic Light Protocol is a set of Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) designations used to ensure that information is shared with the correct audience.
A system that facilitates the transfer of data, in one or multiple directions (low to high or high to low), between different security domains.
Transport layer security is a widely adopted security protocol designed to facilitate privacy and data security for communications over the internet.
An IPsec mode that provides a secure connection between two endpoints by encapsulating an IP payload.
A type of malware or virus disguised as legitimate software, which is used to hack into the victim's computer.
A person or system formally identified as being capable of reliably producing data meeting certain defined parameters, such as a maximum data classification and reliably reviewing data produced by others to confirm compliance with certain defined parameters.
An IPsec mode that provides a secure connection between two endpoints by encapsulating an entire IP packet.
A form of multi-factor authentication (see definition) to confirm a user's claimed identity by combining two different pieces of evidence.