AuCyberScape
AuCyberScape

UNDERSTAND

WHAT IS CYBER SECURITY?

Cyber security is the practice of protecting and defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

How we communicate, work and consume relies on a continuous and infinite flow of data between us and devices, as well as between devices all around the world.

Every organisation, large or small, deals with the security of their own or someone else’s data and information. Securing data and information is now essential.

CYBER SECURITY PRODUCTS AND SERVICES

Cyber security has become necessary to safely navigate a digital world. Understanding and choosing the right cyber security products and services to protect yourself, your family or your business can be challenging.

AUCYBERSCAPE can assist you to understand and connect with Australian cyber security companies that deliver cyber security solutions to address your security needs.

Cyber security definitions of capability, products and services can be quite complex. For AUCYBERSCAPE we searched globally for categories and definitions that were applicable for Australia. This included reviewing the US National Institute of Standards and Technology (NIST) Framework and the University of Bristol UK’s Cyber Security Body of Knowledge guide (CYBOK). 

The cyber security capability categories and definitions used for AUCYBERSCAPE incorporate the CyBOK Knowledge Areas to support international alignment while also recognising previous capability framing in Australia’s Cyber Security Sector Competitiveness Plans. We’ve also considered the Australian business environment and have tailored the categories for the Australian market. This means that we have a few more subcategories but the definitions are easier to understand. This will be continuously evolving to reflect the changes occurring within industry. We welcome your suggestions to make this easier to use. Please visit Contact Us to provide any suggestions or feedback.

Infrastructure security

Securing computer and digital networks and related physical hardware and systems from intruders and intrusions, whether targeted or opportunistic.

Systems security

Operational, network and systems security that includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.

Software and platform security

Security that focuses on keeping software and an entire computing platform and devices – including mobile, cloud and web applications – resilient to cyber threats. This includes information security that protects the integrity and privacy of data, both in transit and at rest.

Created by potrace 1.16, written by Peter Selinger 2001-2019

ATTACKS AND DEFENCES

Proactive and adversarial ‘attack’ approach to protecting against cyber attacks including penetration and vulnerability testing as well as ethical hacking. Defensive security focuses on reactive measures such as patching software and detection.

Human, organisational and regulatory aspects

Tools and services to protect against intentional and unintentional user mistakes, support observance of organisational governance and policies, and enforce compliance to regulatory requirements.

GLOSSARY OF TERMS

USEFUL LINKS

Usefull Link Image

Australian Cyber Security Centre

The Australian Government Australian Signals Directorate and Australian Cyber Security Centre’s website cyber.gov.au contains detailed information and guidelines based on the Australian Information Security Manual (ISM), a cyber security framework intended for Chief Information Security Officers, Chief Information Officers, cyber security professionals and information technology managers.

Link icon
https://www.cyber.gov.au/acsc/view-all-content/ism