Interactive Media
Networking Systems
Cybersecurity
Modelling Tools
100

The means by which users interact with computer hardware or software. In software, this usually comprises fields for text and number entry, mouse pointers, buttons and other graphical elements.

User Interface (UI)

100

A cloud computing model that provides scalable IT infrastructure over the internet.

Infrastructure as a Service

100

The right of individuals and organisations to maintain the confidentiality of their information and to exercise control over the collection, usage, and dissemination of their personal data.

Privacy

100

Shows the input of data from various external entities into a system along with its output.

Data Flow Diagram (DFD)

200

JPEG, PNG, GIF and SVG are common types of this type of file format

Image

200

Distance, topography, and physical barriers are examples of these factors affecting data transmission.

Interference factors

200

Deceiving individuals into visiting malicious websites through various forms of communication like emails, text messages, or calls.

Phishing

200

A type of chart displays the timeline, duration, and overlap of tasks in a project.

Gantt Chart

300

A visual representation of a website or application's layout or structure, used to help plan and organise the website or application's content, navigation and functionality.

Wireframe

300

The amount of data that can be transmitted over a network in a given amount of time.

Bandwidth

300

Individuals or groups who exploit system vulnerabilities to gain unauthorised access to victim data, computers, or networks with the intent to cause harm.

Threat Actor

300

A diagram showing the sequence of steps in a process, often using standard symbols like diamonds and rectangles.

Flowcharts

400

The rights that Aboriginal and Torres Straight Islander peoples have to protect their cultural heritage and traditional knowledge

Indigenous Cultural and Intellectual Property (ICIP)

400

This device connects multiple network segments and directs data packets toward their destination.

Router

400

The potential for loss, damage, or negative outcomes from an action, event, or decision. It combines the likelihood of an adverse event with its impact or severity.

Risk

400

Involves date  person making the entry  progress since the last entry  tasks achieved  stumbling blocks or issues encountered and how they were managed  possible approaches for upcoming tasks  reflective comments  resources used. 

Process Diaries

500

Small pieces of data that are stored on a user's computer or device by a website when they visit it.

Cookies

500

The type of cable that is cheap, but most susceptible to interference.

Twisted Pair

500

It mimics legitimate networks to steal user data.

Evil Twin Wifi Networks

M
e
n
u