<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The language of InfoSec in Career Discussions</title>
    <link>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21020#M1959</link>
    <description>&lt;P&gt;Interestingly enough, one of the keynote speakers at RSA highlighted the fact that we have 21st century issues, but we use 20 century terms to describe them and 19th century solutions.&lt;/P&gt;</description>
    <pubDate>Tue, 09 Apr 2019 19:29:03 GMT</pubDate>
    <dc:creator>canLG0501</dc:creator>
    <dc:date>2019-04-09T19:29:03Z</dc:date>
    <item>
      <title>The language of InfoSec</title>
      <link>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21016#M1957</link>
      <description>&lt;P&gt;Ann Johnson, Corporate Vice President (Cybersecurity Solutions Group) over at Microsoft, is concerned that we are using &lt;A href="https://www.microsoft.com/security/blog/2019/04/08/the-language-of-infosec/" target="_blank" rel="noopener"&gt;too much jargon in information/cyber security work&lt;/A&gt;.&amp;nbsp; People don't understand what we're talking about.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Of course, "Cybersecurity Solutions Group" sounds like "marketing," so it's quite possible that Ann Johnson doesn't actually know what actual security people are talking about ...)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do sympathize, in general.&amp;nbsp; There are people in security, as in any field, who actually create jargon in order to hide the fact that a) they don't actually know what they are talking about, or b) they are only talking about the same stuff you are, but they want it to sound like they know a secret you don't.&amp;nbsp; (See pretty much any episode of "Yes, Prime Minister."&amp;nbsp; YouTube is your friend.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, as the psycholinguistics people note, if you don't have a word for it, you can't really think about it.&amp;nbsp; We have lots of concepts that we have to know about, and which are important to the protect of the systems under our care.&amp;nbsp; We have to have our infosec language.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And that is, after all, why I wrote the &lt;A href="https://www.amazon.ca/Dictionary-Information-Security-Robert-Slade/dp/1597491152/ref=sr_1_6?keywords=dictionary+of+information+security&amp;amp;qid=1554835640&amp;amp;s=books&amp;amp;sr=1-6" target="_blank" rel="noopener"&gt;dictionary&lt;/A&gt; ...&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 18:49:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21016#M1957</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-04-09T18:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: The language of InfoSec</title>
      <link>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21019#M1958</link>
      <description>&lt;P&gt;So I'm talking about &lt;A href="https://community.isc2.org/t5/Career/The-language-of-InfoSec/m-p/21016" target="_blank" rel="noopener"&gt;words and dictionaries&lt;/A&gt; and check that mine is still on Amazon, and note that someone, slanging mine, says that all you need is Google, "just enter DEFINE:word to be defined, and wallah," and realize that when she says "wallah" she actually is trying to use "voila,"and I find it hysterical that in trashing a glossary she doesn't know what word she is trying to use ...&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 19:28:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21019#M1958</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-04-09T19:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: The language of InfoSec</title>
      <link>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21020#M1959</link>
      <description>&lt;P&gt;Interestingly enough, one of the keynote speakers at RSA highlighted the fact that we have 21st century issues, but we use 20 century terms to describe them and 19th century solutions.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 19:29:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21020#M1959</guid>
      <dc:creator>canLG0501</dc:creator>
      <dc:date>2019-04-09T19:29:03Z</dc:date>
    </item>
    <item>
      <title>Re: The language of InfoSec</title>
      <link>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21049#M1961</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, as the psycholinguistics people note, if you don't have a word for it, you can't really think about it.&amp;nbsp; We have lots of concepts that we have to know about, and which are important to the protect of the systems under our care.&amp;nbsp; We have to have our infosec language.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And that is, after all, why I wrote the &lt;A href="https://www.amazon.ca/Dictionary-Information-Security-Robert-Slade/dp/1597491152/ref=sr_1_6?keywords=dictionary+of+information+security&amp;amp;qid=1554835640&amp;amp;s=books&amp;amp;sr=1-6" target="_blank" rel="noopener"&gt;dictionary&lt;/A&gt; ...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Grandpa Rob,&lt;/P&gt;&lt;P&gt;As a colleague and mutual digital friend repeatedly reminded us in another (now extinct) forum we used to share, defining terms (words and phrases) must always take into account the context of usage. If only your dictionary were both definitive and authoritative. We in the security (computer security, network security, information security, information assurance, cyber security, cybersecurity) field are faced with a complexity of usage that usually needs both aspects. Definitive meaning must provide the precise, detailed meaning with connotations for the specific situation (context). The authoritative aspect refers to any legally or administratively specified rule that must be followed in that specific situation. (For example, a definitive Canadian law on corporate security responsibilities may be authoritative in Toronto, Canada, but not in Helsingborg, Sweden.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My favorite example from a real-life experience in my own&amp;nbsp;security (computer security, network security, information security, information assurance, cyber security, cybersecurity) career was with the word &lt;EM&gt;protocol&lt;/EM&gt;. For the general public a protocol is a procedural guideline that tells what to do in a situation, but may not go into the fine details of exactly how to do the what. Physicians and nurses, for instance, have protocols on how to handle specific diagnoses, injuries, or illnesses. In the world of international diplomacy protocol refers to the formal procedures for credentialed diplomats (ambassadors, consuls, etc.) dealing with each other on official business.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the technical side of our field, &lt;EM&gt;protocol&lt;/EM&gt; brings very specific (well, sort of) &amp;nbsp;meaning to the table in computer &amp;nbsp;network management. However, I once watched two government officials engage in a loud table-pounding, yelling argument over network firewall management in which they were both arguing for the SAME THING!. They thought they were disagreeing because each was using the word &lt;EM&gt;protocol&lt;/EM&gt;&amp;nbsp;with a different contextual meaning, without either of them defining the word. One of them, a network engineer, was thinking of &lt;EM&gt;protocol&lt;/EM&gt; as specifically the &lt;A href="https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml#protocol-numbers-1" target="_blank" rel="noopener"&gt;Assigned Internet Protocol Numbers&lt;/A&gt; as declared in the PROTOCOL field &amp;nbsp;of an IPV4 packet header. The other, a network management specialist, was assuming the broader use of the same word in context of &lt;A href="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml" target="_blank" rel="noopener"&gt;data services&lt;/A&gt; in TCP (IP Protocol 6) and UDP (IP Protocol 17) packets, many if which have the word &lt;EM&gt;protocol&lt;/EM&gt; in their names, eg. FTP, HTTP, SMTP, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This raucous display of unprofessional engagement I witnessed was an example of a quite literal case of the two being in &lt;EM&gt;violent agreement&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 12:46:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21049#M1961</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-04-10T12:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: The language of InfoSec</title>
      <link>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21050#M1962</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;," and realize that when she says "wallah" she actually is trying to use "voila,"and I find it hysterical that in trashing a glossary she doesn't know what word she is trying to use ...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;"&lt;EM&gt;Deck us all with Boston Charlie,&lt;BR /&gt;Walla Walla, Wash., an’ Kalamazoo!&lt;BR /&gt;Nora’s freezin’ on the trolley,&lt;BR /&gt;Swaller dollar cauliflower alley-garoo!"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://duckduckgo.com/?q=pogo+christmas+song&amp;amp;t=h_&amp;amp;ia=web" target="_blank" rel="noopener"&gt;&lt;EM&gt;Full search for references&lt;/EM&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 12:57:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Career-Discussions/The-language-of-InfoSec/m-p/21050#M1962</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-04-10T12:57:32Z</dc:date>
    </item>
  </channel>
</rss>

