To confirm that an user can access a specific resource
What is User Authentication?
A security flaw or weakness found in software code that could be exploited
Software Vulnerability
Malicious software designed to infiltrate and damage computer systems without authorisation
Malware
Computer program used to prevent, detect, and remove malware
Antivirus Software
Laws created in the Australian Parliament house that apply to the whole country
Federal Laws
Turn the plaintext into ciphertext
Encrypt
Take advantage of a vulnerability
Exploit
Pretending to be a reputable entity or person in order to induce the disclosure of sensitive information
Pishing
Allows malicious script to be inserted into a regular web page form to gain access or information.
Cross-site scripting (XSS)
The preparing and enacting of laws
Legislation
An encoded message
Ciphertext
Strategies to identify and minimize potential risks
Software auditing and Penetration testing
Eavesdropping attack where communication and data are exposed to an unauthorised third party
Man-in-the-Middle-Attack
Record keystrokes from a computer and send passwords or sensitive information to unauthorised attackers.
Keyloggers
Original work is the property of the person who created it
Copyright Act 1968
The same key is used by the receiver and sender for secure communication over the internet.
Symmetric Encryption
Simulated cyber attack to check for vulnerabilities within a computer system
Penetration Testing
Personal information is accessed, disclosed without authorisation, or is lost.
Data Breaches
Redirects users to false websites that imitate the legitimate URL
Pharming
At a federal level, law is concerned with how information about people can be used.
Privacy Act 1988
Git/Github to manage changes to source code over time
Version Control System
To uncover any issues or problems of a software
Software Auditing
Tricking the victim into clicking 'accept' with admin permissions or into giving the attacker physical access to a device
Social Engineering
SQL injection
Privacy and Data Protection Act 2014 applies to these entities
Centrelink, VicRoads, WorkSafe