Interactive Media
Networks
Cybersecurity
Modelling Tools
100

A genre in gaming that allows users to play within a virtual, free roaming environment.

Sandbox

100

Typically a person, group or organization that has a presence in a social network.

Entity
100

Ensuring that data is protected from unauthorised access, use, or disclosure.

Privacy

100

A diagram that shows how data moves between processes, data stores, and external entities in a system.

Data Flow Diagram

200

Concerns that affect a large amount of people and how they interact with each other.

Social issues

200

The measure of the importance or influence of a node within a network.

Centrality

200

Someone who engages in cyber activities to make political statements and raise awareness about certain issues.

Hacktivist

200

A level of DFD that provides a high-level overview of the entire system, showing only the main process and its interactions.

Level 0

300

A lossless compression format suitable for images with transparent backgrounds or requiring high quality.

PNG

300

A device similar to a hub, however it can send data to specific nodes so only they receive the data they require.

Switch

300

A form of cyberattack where a malicious Wi-Fi network mimics a legitimate one, intercepting sensitive information from unsuspecting users.

Evil twin

300

In a Level 1 DFD, this element represents a transformation of input data into output data.

Process

400

The ownership of creative, mentally derived or problem-solving ideas or products.

Intellectual property

400

Cables that consist of two thin insulated wires, twisted together to form a spiral to reduce the amount of interference from other cabling.

Twisted pair

400

They infiltrate networks to uncover security flaws, and report their findings to the system owner

White hat attacker

400

A DFD component that stores data that can be retrieved or updated by processes, and is typically represented by two parallel lines.

Data store

500

An iterative and flexible project management approach with short cycles and frequent feedback.

Agile approach

500

Refers to the ability of different devices, systems or technologies to communicate and work together seamlessly, regardless of their manufacturer, model or software environment.

Device interoperability

500

A sub-category of phishing that involves sending fraudulent SMS messages to trick individuals into sending personal information.

Smishing

500

A modelling tool often used alongside DFDs to describe the logical steps and decisions within a process.

Flowchart

M
e
n
u