Categories: Bitcoin Entertainment

What These 9 Cyber Security Buzzwords And Jargon Terms Really Mean

Click here to view original web page at

By Sue Poremba

Hybrid cloud. BYOD. Big Data. Internet of Things. These are terms that have become part of the daily lexicon, not only within the information technology (IT) and cyber security world but also in the main stream. Jargon is integral to IT. They make complicated terms more accessible to the non-technical person, even if they aren’t easier to understand.

Buzzwords are commonplace in IT security, as well, but are they truly understood? As Frank Ohlhorst writes in Tech Republic, “it seems that IT security managers are giving too much power to terms and buzzwords, letting them dictate security best practices.” Ohlhorst goes on to point out that while BYOD is just an acronym that means, simply, Bring Your Own Device (such as when a company allows its employees to use their personally-owned phones, laptops, and other devices to access the network for work purposes), security professionals see it as Bring Your Own Disaster and the beginning of a security nightmare.

Some security buzzwords and jargon are to the point, like ransomware or phishing, while others, like cloud security or compliance, are a little more ambiguous. Here are a few popular terms and what they really mean for security.

Cloud security. It’s easy to lump all security within cloud computing under one term, but it differs between public clouds and private clouds. Private cloud security is approached in the same manner as any other in-house network security, while public cloud security will involve a third-party vendor. In basic terms, Ari Zoldan CEO, Quantum Networks, breaks down “cloud security” as a component of computer security which deals with the policies, technologies, and controls put into place to protect data, applications, and the associated infrastructure of cloud computing, but for IT security professionals, it really needs to be disseminated based on the type of cloud.

Compliance. It seems like everyone wants to have their company become compliant with all types of rules and regulations meant to keep data secure. That’s a good thing. But for many companies, “compliant” is doing the bare minimum toward data security while claiming the company meets regulatory standards. Real compliance is an on-going process to do everything possible to prevent breaches and other threats.

Let’s take a closer look at 9 cyber security terms and uncover their true definitions.

Cyber espionage. This is the act of stealing secrets from one company or individual via the Internet with the intent on using them for personal, or more often, political or military, gain. Often this term is used when individuals or groups representing a country or organization infiltrate an “enemy’s” network. Countries like China and Russia and groups like the Syrian Electronic Army are often accused of cyber espionage. This buzzword shouldn’t be confused with cyberwarfare, which consists of different types of threats, including cyber espionage, conducted specifically by nation states.

Data Loss Prevention. Data Loss Prevention (DLP) is often the term used to describe the last point of defense against a cyberattack, but it is actually the strategy and software the security team develops to protect data.

Endpoint Protection Platforms. Gartner explains endpoint protection platforms (EPP) as “a solution that converges endpoint device security functionality into a single product that delivers antivirus, anti-spyware, personal firewall, application control and other styles of host intrusion prevention (for example, behavioral blocking) capabilities into a single and cohesive solution.” It’s an essential need for information security, as every device we use – from our computers to smartphones – is considered an endpoint and needs to be secured. The problem it helps to solve is protecting the overwhelming number and types of devices now being connected to networks.

Privacy. When it comes to data security, privacy is tricky because what it means to one person (say the employee using BYOD) isn’t what it means to another (say the NSA). For the IT security professional, however, data privacy is ensuring that sensitive information, such as personally identifiable information of customers and others, remains hidden and inaccessible to network intruders.

Ransomware. This is malware, but a very specific type of malware that requires some sort of ransom payment to either remove the malware or to retrieve files that had been encrypted by the malware. Ransomware has been around for a long time, but it made news this year when Cryptolocker encrypted files and then demanded payment in Bitcoin.

Risk management. This is jargon that gets thrown around a lot, as in “we must develop a risk management program.” But what exactly is risk management? The Information Systems Audit and Control Association describes it this way: “Information risk management defines the areas of an organization’s information infrastructure and identifies what information to protect and the degree of protection needed to align with the organization’s tolerance for risk. It identifies the business value, business impact, compliance requirements and overall alignment to the organization’s business strategy. Once this information has been identified, it can be presented to the business leadership to make decisions about the level of investment (both financial and resource) that should be utilized to create appropriate information protection and risk management capabilities.”

Phishing. Phishing is one of the oldest forms of malicious social engineering, but it remains one of the most effective because spammers do a good job at luring users to click on malicious links or open malware-laden attachments. It is a specific form of social engineering used to gather personally identifiable information. Phishing emails appear to come from a trusted source, such as a friend or a well-known business. Over time, phishing has evolved to include spear phishing (targeted attempts highly personalized for a specific target) and whaling (phishing scams that target high-profile users and decision makers).

The buzzwords and jargon discussed here are just the tip of the security iceberg, but they represent the terms that are used and often misunderstood within IT security.

Sue Poremba is an information security writer based in Central Pennsylvania and the author of The Phillies Fan’s Little Book of Wisdom.

Related must reads:

1. Cyber Security Professionals Forecast Concerns For 2015
2. How To Conduct An Information Security Gap Analysis
3. Information Security Exposure: Is Your Company’s Information Running Around Naked?

Hybrid cloud. BYOD. Big Data. Internet of Things. These are terms that have become part of the daily lexicon, not only within the information technology (IT) and cyber security world but also in the main stream. Jargon is integral to IT. They make complicated terms more accessible to the non-technical person, even if they aren’t easier to understand.

Buzzwords are commonplace in IT security, as well, but are they truly understood? As […]


Illuminati, Mason, Anonymous I'll never tell. I can tell you this, global power is shifting and those who have the new intelligence are working to acquire this new force. You matter naught except to yourself, therefore prepare for the least expected and make your place in the new world order.

Disqus Comments Loading...
Published by
Tags: one

Recent Posts

$10K Bitcoin Stronger Than Ever But No One Seems to Care: Google Trends

Risk Disclaimer - By using this web site you agree to its terms and conditions. All materials, including but not… Read More

5 hours ago

Bitcoin Is A Hedge Against Gov’t “Fiscal Irresponsibility”, Analyst

Equities portfolio manager turned crypto fund executive Travis Kling has argued that Bitcoin has come into its own as a… Read More

5 hours ago

Why Are France & Germany Blocking Facebook’s Crypto? The Euro, Apparently

For those most part, governments have ignored Bitcoin . While the crypto asset’s proponents see it as the future of… Read More

5 hours ago

U.S. Charges JPMorgan Suits for ‘Spoofing’ Precious Metals Markets

| Source: Lorimer Images/Shutterstock The United States Department of Justice has charged three gold and precious metals traders from JPMorgan… Read More

6 hours ago

Your Crypto Exchange Can’t Send Even $1000 Without Exposing You

Regulator-compliant crypto exchanges are required to share your information with other financial institutions. | Source: Horth Rasur/Shutterstock Transferring more than… Read More

6 hours ago

Bigger Bloodbath in U.S. Stock Market Likely: Factors of Further Downtrend

Geopolitical risks and an uncooperative Fed could trigger a short-term relapse in stock prices. | Image: Shutterstock The U.S. stock… Read More

6 hours ago

This website uses cookies. We use these cookies to collect data about your interaction with our website for the purpose of continuously improving your experience with our site. For more information we encourage you to read our privacy policy.

Read More