5G
|
The next cellular
communications standard in development to replace existing 4G technology.
Most commonly associated with providing wireless internet services to
electronic devices. 5G is predicted to be in common use by 2020.[1]
|
Artificial intelligence
(AI)
|
The simulation of
intelligence processes by machines, especially computer systems.
|
Australian Cybercrime Online Reporting Network (ACORN)
|
An Australian government
initiative to provide information to the public on how to identify cybercrime
and methods of mitigating the risk of being affected by common cybercrime.
|
Backdoor
|
A means to access a
computer system or encrypted data that bypasses the system's customary
security mechanisms.
|
Bitcoin
|
A digital currency and
payment system underpinned by blockchain technology. Bitcoins can be used for
online purchases, or converted into traditional currency.
|
Blockchain
|
A distributed database that
maintains a continuously growing list of records, called blocks, secured from
tampering and revision.
|
Botnet
|
'Backdoors' are a category
of malware that enable a cybercriminal to remotely control an infected
computer over a network. Such an infected computer is often called a robot or
‘bot’ computer. When several computers are infected with a backdoor and
become bots, they can be simultaneously controlled from a single remote mechanism.
These remotely controlled networks of bot computers are known as ‘botnets’.
|
Cloud computing
|
Provides for storing and
potential processing of data offsite from a person's or entity's main
premises.
|
Computer Network Operation (CNO)
|
A form of extraterritorial
police activity used to investigate the 'dark web'.
|
Critical infrastructure
|
Critical systems, services
and facilities underpinning the operation of society and the economy, such as
electricity and transportation networks, water services, healthcare systems
and banking.
|
Cryptocurrency
|
A
form of digital currency where encryption techniques are used to regulate the
generation of units of currency and verify the transfer of funds.
|
Cybercrime
|
Cybercrime
relates to criminal activities carried out by means of computers or via the internet.
Cybercrime is also referred to as 'computer crime'. It encompasses a wide
range of criminal activities encompassing:
(a)
crimes where computers or other
ICTs are an integral part of an existing offence (such as online fraud or
online child sex offences); and
(b)
crimes directed at computers or ICTs
(such as illegally modifying electronic data or seeking a ransom to unlock a
computer affected by malicious software).[2]
|
Cyber
security
|
Broadly
encapsulates measures relating to the confidentiality, availability and
integrity of information that is processed, stored and communicated by
electronic or similar means.[3]
|
Dark
web
|
The
dark web is made up of sites that are not indexed by search engines and are
only accessible through specialty networks such as Tor. Often, the dark web
is used by website operators who want to remain anonymous. The ‘dark web’ is
a subset of the ‘deep web’.
|
Deep web
|
The part of the internet
that is not indexed by search engines. Includes websites that are
password-protected and pay walled, encrypted networks and databases, and
dynamic data such as social media feeds. Also includes the dark web.
|
Digital
currency
|
A
digital representation of value that can be digitally traded and functions as
(1) a medium of exchange; and/or (2) a unit of account; and/or (3) a store of
value, but does not have legal tender status.
|
Digital
evidence
|
Also
called 'electronic evidence'. Any information stored or transmitted in
digital form that a party to a court case may use at trial.[4]
|
Encryption
|
The
conversion of electronic plaintext data into unreadable cipher text using
algorithms. Encryption protects the confidentially of data at rest and in
transit. Both encryption and decryption are functions of cryptography.
|
End
to end encryption
|
A
method of secure communication where only the communicating users can read
data transferred from one end system or device to another.
|
Going
dark
|
A
term often used by users of social media to describe situations where digital
communications that appear to have ceased are moved from the public sphere
into a private communication channel that prevents others from monitoring it.
|
Hacking
|
‘Hacking’
is a term with multiple meanings. It can refer to testing and exploring
computer systems, highly skilled computer programming or the practice of
accessing and altering other people’s computers. Hacking may be carried out
with honest aims or with criminal intent.
|
Five
Eyes Alliance
|
An
intelligence alliance involving the United Kingdom, United States, Canada,
Australia and New Zealand.
|
Information and communications technology (ICT)
|
Any
device that can process, store or communicate electronic information.
|
Internet
|
The
global system of interconnected computer networks that use standardised
communication protocols to link devices and provide a variety of information
and communication facilities.
|
Internet
of Things (IoT)
|
A
term to describe the way in which the internet is transforming the way in
which people work, live and play by combining internet connectivity and data
analytic capabilities with consumer products, durable goods, cars and trucks,
industrial and utility components, sensors, and other everyday objects.[5]
|
Internet Protocol (IP)
|
The technology that allows
computers and other electronic devices to connect to the internet.
|
Malware
|
Malware is a general term
used for software designed to damage or subvert a computer or information
system.
|
Mesh network
|
A wireless mesh network
combining multiple routers into a single and larger local network.
|
Mutual Legal Assistance
Treaty (MLAT)
|
An agreement between
governments to facilitate the exchange of information relevant to an
investigation in at least one of those countries.
|
Network Investigation
Technique (NIT)
|
A form of extraterritorial
police activity used to investigate the 'dark web'.
|
Silk Road
|
A now defunct illicit
marketplace located on the dark web.
|
Technology-enabled crime
|
The use of computers or
other ICTs to commit or facilitate the commission of traditional crimes.[6]
|
Telephone interception (TI)
|
TI 'consists of listening
to or recording, by any means, such a communication in its passage over that
telecommunications system without the knowledge of the person making the
communication'.[7]
|
The Onion Router (Tor)
|
Free software used to
anonymise access to the internet by routing data through multiple anonymised
networks, allowing users to mask their usage and location. It is the most commonly
used means to access the dark web.
|
Virtual Private Network
(VPN)
|
An encrypted communication
that creates a safe connection between a device and a network over a less
secure network.
|