The means by which users interact with computer hardware or software. In software, this usually comprises fields for text and number entry, mouse pointers, buttons and other graphical elements.
User Interface (UI)
A cloud computing model that provides scalable IT infrastructure over the internet.
Infrastructure as a Service
The right of individuals and organisations to maintain the confidentiality of their information and to exercise control over the collection, usage, and dissemination of their personal data.
Privacy
Shows the input of data from various external entities into a system along with its output.
Data Flow Diagram (DFD)
JPEG, PNG, GIF and SVG are common types of this type of file format
Image
Distance, topography, and physical barriers are examples of these factors affecting data transmission.
Interference factors
Deceiving individuals into visiting malicious websites through various forms of communication like emails, text messages, or calls.
Phishing
A type of chart displays the timeline, duration, and overlap of tasks in a project.
Gantt Chart
A visual representation of a website or application's layout or structure, used to help plan and organise the website or application's content, navigation and functionality.
Wireframe
The amount of data that can be transmitted over a network in a given amount of time.
Bandwidth
Individuals or groups who exploit system vulnerabilities to gain unauthorised access to victim data, computers, or networks with the intent to cause harm.
Threat Actor
A diagram showing the sequence of steps in a process, often using standard symbols like diamonds and rectangles.
Flowcharts
The rights that Aboriginal and Torres Straight Islander peoples have to protect their cultural heritage and traditional knowledge
Indigenous Cultural and Intellectual Property (ICIP)
This device connects multiple network segments and directs data packets toward their destination.
Router
The potential for loss, damage, or negative outcomes from an action, event, or decision. It combines the likelihood of an adverse event with its impact or severity.
Risk
Involves date person making the entry progress since the last entry tasks achieved stumbling blocks or issues encountered and how they were managed possible approaches for upcoming tasks reflective comments resources used.
Process Diaries
Small pieces of data that are stored on a user's computer or device by a website when they visit it.
Cookies
The type of cable that is cheap, but most susceptible to interference.
Twisted Pair
It mimics legitimate networks to steal user data.
Evil Twin Wifi Networks