
In Australia and the United Kingdom the terminology refers to two words “Cyber Security” and in the United States quite commonly the terminology is “Cybersecurity” we will refer to the U.S. variant in relevant examples, and the Australian version in all of our content.
At AICS, we define Cyber Security as:
“The means of protecting the integrity of data in information systems through passive and active measures from any external threat that seeks to compromise the integrity of the data or the system that houses it. Cyber Security relies on the involvement and adherence to processes, procedures, and people administering the technology available to protect data.”
In Australia, the Government through the Australian Signals Directorate determined Cyber Security to be characterised by Four principles:[1]
- Govern: Identifying and managing security risks.
- Protect: Implementing controls to reduce security risks.
- Detect: Detecting and understanding cyber security events to identify cyber security incidents.
- Respond: Responding to and recovering from cyber security incidents.
Almost every modern day application or device relies on computers and the internet — communication (e.g., messaging apps, email, smartphones, tablets, IOT), entertainment (e.g., streaming, smart TVs, interactive video games, mobile apps, social media), transportation (e.g., GPS and mapping systems, meta data, geolocating and location services), shopping (e.g., e-commerce, withdrawing cash, online shopping, credit cards), healthcare (e.g., medical records and information, medical treatment, medicines and medical equipment), and these are just a few examples.
The goal of AICS is to help improve the cyber security of organisations and the broader public. To read more about our Mission, click here.
[1] https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-principles