Cyber security is the practice of protecting and defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
How we communicate, work and consume relies on a continuous and infinite flow of data between us and devices, as well as between devices all around the world.
Every organisation, large or small, deals with the security of their own or someone else’s data and information. Securing data and information is now essential.
Cyber security has become necessary to safely navigate a digital world. Understanding and choosing the right cyber security products and services to protect yourself, your family or your business can be challenging.
AUCYBERSCAPE can assist you to understand and connect with Australian cyber security companies that deliver cyber security solutions to address your security needs.
Cyber security definitions of capability, products and services can be quite complex. For AUCYBERSCAPE we searched globally for categories and definitions that were applicable for Australia. This included reviewing the US National Institute of Standards and Technology (NIST) Framework and the University of Bristol UK’s Cyber Security Body of Knowledge guide (CYBOK).
The cyber security capability categories and definitions used for AUCYBERSCAPE incorporate the CyBOK Knowledge Areas to support international alignment while also recognising previous capability framing in Australia’s Cyber Security Sector Competitiveness Plans. We’ve also considered the Australian business environment and have tailored the categories for the Australian market. This means that we have a few more subcategories but the definitions are easier to understand. This will be continuously evolving to reflect the changes occurring within industry. We welcome your suggestions to make this easier to use. Please visit Contact Us to provide any suggestions or feedback.
Click on the categories below to view companies on AUCYBERMAP that deliver products and services within that category.
Securing computer and digital networks and related physical hardware and systems from intruders and intrusions, whether targeted or opportunistic.
Operational, network and systems security that includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.
Security that focuses on keeping software and an entire computing platform and devices – including mobile, cloud and web applications – resilient to cyber threats. This includes information security that protects the integrity and privacy of data, both in transit and at rest.
Proactive and adversarial ‘attack’ approach to protecting against cyber attacks including penetration and vulnerability testing as well as ethical hacking. Defensive security focuses on reactive measures such as patching software and detection.
Tools and services to protect against intentional and unintentional user mistakes, support observance of organisational governance and policies, and enforce compliance to regulatory requirements.
This glossary explains cyber security related terms used on this site.
Provides start-ups with commercialisation and/or business maturity support in the early stages of a product or service entering the market for the first time or iterating into new markets.
Synchronized, real-time capability to discover, detect, analyse, and mitigate threats and vulnerabilities. (Source: https://www.nist.gov)
A system, software or product intended to identify or prevent fraudulent practices.
Software that is designed to detect, stop and remove viruses and other kinds of malicious software. (Source: https://www.cyber.gov.au)
Passive and active devices and software designed and implemented to prevent data or code within an application from being compromised. Includes: endpoint security, firewall and antivirus, intrusion detection, vulnerability scanning, email security and application whitelisting.
Protection against malicious code (malware) on systems. Ensuring that only authorised applications can be executed. (Source: https://www.cyber.gov.au)
Incorporating machine learning to enable greater accuracy and speed in responding to cyber threats and managing cyber risks. Note, this includes advanced forms of machine learning colloquially referred to or described as artificial intelligence.
A form of security that recognises a user’s identity and/or other individualised credentials and only allowing access to authorised/ approved/valid users.
Proactive and adversarial ‘attack’ approach to protecting against cyber attacks including penetration and vulnerability testing as well as ethical hacking. Defensive security focuses on reactive measures such as patching software and detection.
The ways and means, including software platforms, that allow organisations to make decisions about who and what is allowed to access which information assets, when and in what context.