Australian Parliament House closed to visitors - the public main entrance will be closed indefinitely from 5pm 25 March 2020. Read more.

Glossary

Navigation: Previous Page | Contents | Next Page

Glossary

Chat room  An area on the Internet where users can communicate in real time.

Cryptography  Encrypting of data so that it is unintelligible.

Cybercrime Criminal activity which uses or takes place through communications technology, including the Internet, telephony and wireless technology.

Hacking Unauthorised access to computer data.

Internet A facility which allows computers to be linked via an international network.

ISP  Internet Service Provider – also called Internet Access Providers. (IAPs): a business which sells a service enabling subscribers to use the Internet.  The  provider’s service  includes providing software and a phone number.  The client also selects a password which allows access to the service.  The ISP provides a portal through which all of the client’s internet traffic is visible to the ISP.  ISPs themselves are connected to one another through Network Access Points (NAPs).  

ICH Internet Content Hosts:  persons who host Internet content in Australia, or who propose to host Internet content in Australia. Examples include a web farm such as Webcentral or a person who has their own website or server and hosts content provided by a range of contributors. (Source: Internet Industry Association Website at http://www.iia.net.au).

Payload. In communications and information science, a payload is a set of data, such as a data field, block, or stream, being processed or transported, the part that represents user information and user overhead information, and may include user-requested additional information, such as network management and accounting information. (Wiki pedia: http://www.wikipedia.org/wiki/Payload).

SPAM  unwanted commercial bulk messages randomly sent to email addresses.

Steganography  A process in which illegal data is contained in seemingly innocuous files, such as photographs, which can then be reworked at the destination so as to allow access to the illegal data.

Trojan Trojans are malicious stand alone programs, often sent via an email attachment which, when opened alters or deletes files on the machine, or access emails. It does not replicate nor send itself to other machines.

URL Universal Resource Locator: the address of a website.

Virus  A piece of program code. Like a biological virus it copies itself and then attaches to a “host”- another computer program - which can then transfer the virus to other computers, damaging all in its wake.  Viruses can be destructive by altering files or erasing information from disks.  More seriously they can allow others to gain access to a person’s computer without authorisation.

Worms  A computer worm is a self-replicating computer program, which unlike the virus does not need to attach itself to another program in order to propagate itself.  A worm can delete files, or send email documents. 

Navigation: Previous Page | Contents | Next Page

Top