AUCYBERSCAPE

WHAT IS CYBER SECURITY?

Cyber security is the practice of protecting and defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

How we communicate, work and consume relies on a continuous and infinite flow of data between us and devices, as well as between devices all around the world.

Every organisation, large or small, deals with the security of their own or someone else’s data and information. Securing data and information is now essential.

CYBER SECURITY PRODUCTS AND SERVICES

Cyber security has become necessary to safely navigate a digital world. Understanding and choosing the right cyber security products and services to protect yourself, your family or your business can be challenging.

AUCYBERSCAPE can assist you to understand and connect with Australian cyber security companies that deliver cyber security solutions to address your security needs.

Cyber security definitions of capability, products and services can be quite complex. For AUCYBERSCAPE we searched globally for categories and definitions that were applicable for Australia. This included reviewing the US National Institute of Standards and Technology (NIST) Framework and the University of Bristol UK’s Cyber Security Body of Knowledge guide (CYBOK). 

The cyber security capability categories and definitions used for AUCYBERSCAPE incorporate the CyBOK Knowledge Areas to support international alignment while also recognising previous capability framing in Australia’s Cyber Security Sector Competitiveness Plans. We’ve also considered the Australian business environment and have tailored the categories for the Australian market. This means that we have a few more subcategories but the definitions are easier to understand. This will be continuously evolving to reflect the changes occurring within industry. We welcome your suggestions to make this easier to use. Please visit Contact Us to provide any suggestions or feedback. 

Click on the categories below to view companies on AUCYBERMAP that deliver products and services within that category.

GLOSSARY OF TERMS

This glossary explains cyber security related terms used on this site.

Search:
(clear)
  • Accelerator program

    Provides start-ups with commercialisation and/or business maturity support in the early stages of a product or service entering the market for the first time or iterating into new markets.

  • Active defence

    Synchronized, real-time capability to discover, detect, analyse, and mitigate threats and vulnerabilities. (Source: https://www.nist.gov)

  • Anti-fraud

    A system, software or product intended to identify or prevent fraudulent practices.

  • Antivirus

    Software that is designed to detect, stop and remove viruses and other kinds of malicious software. (Source: https://www.cyber.gov.au)

  • Application security

    Passive and active devices and software designed and implemented to prevent data or code within an application from being compromised.  Includes: endpoint security, firewall and antivirus, intrusion detection, vulnerability scanning, email security and application whitelisting.

  • Application whitelisting

    Protection against malicious code (malware) on systems. Ensuring that only authorised applications can be executed. (Source: https://www.cyber.gov.au)

  • Autonomous systems security

    Incorporating machine learning to enable greater accuracy and speed in responding to cyber threats and managing cyber risks. Note, this includes advanced forms of machine learning colloquially referred to or described as artificial intelligence.

  • Authentication including biometrics

    A form of security that recognises a user’s identity and/or other individualised credentials and only allowing access to authorised/ approved/valid users.

  • Attacks and defences

    Proactive and adversarial ‘attack’ approach to protecting against cyber attacks including penetration and vulnerability testing as well as ethical hacking. Defensive security focuses on reactive measures such as patching software and detection.

  • Access and identity management

    The ways and means, including software platforms, that allow organisations to make decisions about who and what is allowed to access which information assets, when and in what context.

USEFUL LINKS

Australian Cyber Security Centre

The Australian Government Australian Signals Directorate and Australian Cyber Security Centre’s website cyber.gov.au contains detailed information and guidelines based on the Australian Information Security Manual (ISM), a cyber security framework intended for Chief Information Security Officers, Chief Information Officers, cyber security professionals and information technology managers.

TERMINOLOGY/GLOSSARY OF TERMS

PRINCIPLES

GUIDELINES