Australian Psychology Society This browser is not supported. Please upgrade your browser.

Glossary

  • Advanced encryption standard (AES): is a symmetric encryption (meaning the same key is used for both encrypting and decrypting data) algorithm (block cipher) designed to be efficient in both hardware and software. AES encryption algorithms support a block length of 128 bits and key lengths of 128, 192, and 256 bits.
  • Audit trail: refers to the monitoring and logging of user activity in a system or application. Keeping an audit trail assists with monitoring of access to data.
  • Bandwidth: refers to the maximum data transfer rate (speed) of a network or internet connection. It measures how much data can be sent or received over a specific connection within a specified time frame. Typically internet connections have both upload and download speeds. Often bandwidth relates to the internet connection speed provided by the internet service provider. For example, your internet service provider may offer different internet plans depending upon the speed you require (e.g., 100 Mbps download and 25Mbps upload speeds). Mbps refers to megabits per second. Providers can check the speed of their network by conducting a network speed test at www.speedtest.net in order to ensure successful use of the videoconference software. It is recommended that clients also run this speed test to ensure their internet connectivity is capable of conducting videoconferencing. The bandwidth required for videoconferencing may depend upon the technology, specifically the teleconferencing software, being utilised.
  • Broadband: refers to high-speed data transmission in which a single cable can carry a large amount of data simultaneously. The most common types of broadband connections in Australia are cable, ADSL and NBN.
  • Encryption: is the process of converting data into an unrecognisable or “encrypted” form and is commonly used to protect sensitive information from unauthorised parties. Files and storage devices can be encrypted as can data transferred over wireless networks and the internet. There are many different types of encryption algorithms however the most common type is AES (Advanced Encryption Standard). The larger the encryption key the more secure the data. For example, AES-256 is recommended for securing personal information.
  • Firewall: is a piece of software or hardware that sits between your computer and the internet and acts as the gatekeeper for all incoming and outgoing traffic. It helps to protect against hackers and also to inhibit the activities of malware and viruses.
  • Hardware (computer): Computer hardware refers to the physical components of a computer system such as the internal hard drive, motherboard, video card etc.
  • ICT: refers to information and communication technology
  • Information security: means all measures used to protect any information generated by an entity or individual that is not intended to be made publicly available from compromise, loss of integrity or unavailability.
  • Internet dropouts: refers to a loss of internet access, including temporary outages.
  • Internet Protocol (IP): provides a standard set of rule for sending and receiving data over the internet. It also allows devices running on different platforms to communicate with each other as long as they are connected to the internet.
  • Interoperability: is the ability of different information technology systems and software applications to communicate and exchange information.
  • Network latency: the amount of time a message (or packets of data) takes to get from one designated point to another (i.e., from the provider to the client via a computer network). Latency in communication is the wait time associated with the signal travelling the geographical distance including the time it takes for computing equipment to process the data.
  • Malware: is short for malicious software or code that can stop your computer working properly, deletes or corrupts files, steals information or allows others to access your computer and your business information. It is specifically designed to cause damage and/or disruptions and can come in the form of viruses, Trojans, worms or spyware.
  • Virus: is a type of malware that attaches itself to a program or file, which is how it spreads from one computer to another. It can be spread by human action, such as sharing infected files or sending emails with viruses as attachments.
  • Intrusion: refers to the act of gaining unauthorised access to a system by breaking the security or causing the computer system to enter an insecure state (i.e., hacking).
  • Information security: all measures used to protect information (not intended to be made publicly available) generated by an entity or individual from compromise, loss of integrity or unavailability.
  • Personal information has a specific meaning as set out in s 6(1) of the Privacy Act:
    • Information or an opinion about an identified individual, or an individual who is reasonably identifiable:
    • whether the information or opinion is true or not; and
    • whether the information or opinion is recorded in a material form or not.
  • Computer platform: generally refers to the operating system and computer hardware. Platforms conform to a set of standards that enable software developers to develop applications for that platform. The most common example is the difference between software that can run on Apple MAC computers and devices compared with those designed to run on PC or android devices.
  • Secure real time transport protocols (SRTP): is a protocol that provides encryption (typically AES), authentication and integrity verification of data and messages (passed through the RTP-based communication protocol).
  • Securely exchange documents: involves the secure delivery of documents and other information. It typically involves an online exchange of documents using a server-based approach where the recipient is personally identified and transactions are logged by the secure platform.
  • SIP (session initiation protocols) encryption: is used for establishing sessions between two or more telecommunications devices over the internet. SIP can be used to initiate videoconferences, transfer files, instant messaging, and multiplayer games. SIP encryption means SIPs are encrypted so they cannot be read if intercepted. This helps to ensure the communication is protected against interception.
  • Smart device: refers to any device that has internet connectivity and includes toys, tablets, phones, fridges, televisions etc.
  • Software: is a general term for various kinds of programs and applications used to operate computers and related devices and typically perform certain tasks, including word processing, spreadsheet, email and videoconferencing.
  • Strong passwords: refers to unique and long passwords to lower the overall risk of a security breach. Strong passwords do not include repeated characters; words from the dictionary; numerical sequences (such as 1234567); personal information or a previously used password. Strong password systems also include the requirement to change passwords often but not frequently enough that poor passwords are created.
  • Synchronous: is the real time communication between two people. Within ICT, synchronous means both the transmitter and receiver are in step with each other through a continuous stream of data signals.
  • Technical support: is a service provided or engaged to assist with ICT issues/matters.
  • Telehealth technology: includes all hardware, software and equipment required to enable a teleconference session between the provider and the client.
  • Teleconferencing software: is a software program that enables an audio and visual connection between two or more people.
  • Transport layer security (TLS): is a cryptographic protocol that provides secure communications over the internet.
  • End-to-end encryption (E2EE): E2EE is a system of communication security where the communication can only be read by the two people communicating. That is, the message is encrypted at the transmitting end and remains encrypted until received and decrypted on the intended recipients device.
  • VPN (Virtual Private Network): is a technology that creates a safe and encrypted connection over a less secure network (such as the internet).
  • Two-factor (step) authentication (2FA): refers to the use of two checks in place to confirm the user’s identity before access to the system is granted. An example of two steps is: 1) the use of a password to initially access the system, and 2) the use of a token, such as a dynamic number sent to your mobile phone, to confirm your identity and grant access (‘2 steps’).
  • Upload speed: refers to how quickly data can be uploaded to the internet and is measured as megabits per second (Mbps).
  • Download speed: refers to how quickly data can be downloaded from the internet and is measured as megabits per second (Mbps).
  • Video and audio codecs: Codecs are compression technologies that have two components, an encoder to compress the file and a decoder to decompress the file. In order to stream information quickly, codecs help to compress the data required for transmission. In videoconferencing the Codec must be at both the source and destination of a communication link. The coder compresses the signal for data transmission and the decoder expands the signal when received. In order for two video conferencing systems to communicate they must negotiate their video and audio codecs at the start of the connection.
  • Web-based teleconferencing service: refers to providers of teleconferencing services where, rather than using downloaded software on each person’s computer, parties to the teleconference connect by logging into the website of the videoconference provider.
  • Wi-Fi: is short for Wireless Fidelity and refers to wireless networking technology.

Find a Psychologist

Access thousands of psychologists across Australia

Search near me