<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Egregious misuse of cyber security terminology in Member Support</title>
    <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5507#M732</link>
    <description>&lt;P&gt;All issues related to Security today - IT Security , Information Security , Data Security are clubbed as Cyber security issues .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Suddenly everyone is only a Cyber security Professional .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It feels as if everything is now either in the cloud or virtual . !!!&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jan 2018 11:36:56 GMT</pubDate>
    <dc:creator>rsequeira_b</dc:creator>
    <dc:date>2018-01-24T11:36:56Z</dc:date>
    <item>
      <title>Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5487#M726</link>
      <description>&lt;P&gt;I am turning the tables and am going to ask all of YOU.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Post your examples of policies, regulations, articles, blogs, - basically anything written, that misuses key security terms like risk, threat, vulnerability, etc.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This could be fun.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mc&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 21:43:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5487#M726</guid>
      <dc:creator>jmccumber</dc:creator>
      <dc:date>2018-01-23T21:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5495#M727</link>
      <description>&lt;P&gt;Maybe I'm old (or oldschool), but I don't like when:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Articles use the term "hacker" to refer to criminals who use a computer&lt;/LI&gt;&lt;LI&gt;Any criminal act or crime "on the internet" is automatically called "hacking" or "cyber crime"&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Other than that, I generally find that the popular press is unable to understand the difference between a side-channel attack against a specific implementation of a cryptosystem and the cipher itself being "broken," - as in, mathematically proven to not provide the level of security that was thought. No one is "breaking AES in 30 seconds!" -- they're recovering key material by monitoring signals eminated from the implementation during operation and using that to reduce the problem space to recover the rest of the key. That's fundamentally different than showing AES is broken.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 23:54:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5495#M727</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-23T23:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5498#M728</link>
      <description>&lt;P&gt;I came across one at work the where someone had basically&amp;nbsp;conflated 'reducing' the attack surface with every other concept in cybersecurity&amp;nbsp;by using it as&amp;nbsp;a consumer&amp;nbsp;durable in what&amp;nbsp;was essentially&amp;nbsp;a list of controls, that ended with 'and significantly reduces the attack surface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Patches, MFA, using Linux, having a procedure, administrative controls... it all got it. Just try making your own controls up:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"We keep a rabid St Bernard in our server room that tries to kill everybody who enters. This makes the webservers less accessible&amp;nbsp;to attackers because their fingers are chomped off and they can no longer easily introduce Disney themed mass produced comedy USB drives... thereby significantly reducing the attack surface."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you can see, it lends a superior air of authenticity and authority!&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 02:11:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5498#M728</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-01-24T02:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5504#M730</link>
      <description>Also, calling virtualization, especially slim-line virtualization like jails/zones/containers a “security” technology induces a major dose “you keep using that word. I do not think it means what you think it means.”&lt;BR /&gt;&lt;BR /&gt;That is not to say that compartmentalization doesn’t provide some security benefit, BUT relying solely on it is basically the same thing as doing nothing.</description>
      <pubDate>Wed, 24 Jan 2018 03:00:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5504#M730</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-24T03:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5505#M731</link>
      <description>&lt;P&gt;I have one to kick it off. How about we start spelling "cybersecurity" properly as defined in both Oxford and Webster dictionaries. Then maybe we can get Microsoft to update their dictionary.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 11:29:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5505#M731</guid>
      <dc:creator>SecurityDrew</dc:creator>
      <dc:date>2018-01-24T11:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5507#M732</link>
      <description>&lt;P&gt;All issues related to Security today - IT Security , Information Security , Data Security are clubbed as Cyber security issues .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Suddenly everyone is only a Cyber security Professional .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It feels as if everything is now either in the cloud or virtual . !!!&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 11:36:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5507#M732</guid>
      <dc:creator>rsequeira_b</dc:creator>
      <dc:date>2018-01-24T11:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5520#M736</link>
      <description>&lt;P&gt;I think we need some GIFs... How about it mods?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:04:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5520#M736</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-01-24T15:04:54Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5524#M737</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1178953787"&gt;@Badfilemagic&lt;/a&gt; wrote:&lt;UL&gt;&lt;LI&gt;Articles use the term "hacker" to refer to criminals who use a computer&lt;/LI&gt;&lt;LI&gt;Any criminal act or crime "on the internet" is automatically called "hacking" or "cyber crime"&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I share this pet peeve. We should instead call these folks what they are - thieves, vandals, perverts. Instead, the media calls them "hackers," and it's like they're wizards and the Internet is Hogwarts. The terminology obfuscates the reality. In fairness, those of us on the technical end of things tend to get hung up more on terminology than meaning, too. I recall a meeting where are CEO was delicately dressed down for referring to something as SQL insertion rather than injection. Who cares? In this case the CEO understand the concept but butchered the words. We get too caught up as to whether something is "data" or "information" or we're willing to go to verbal war over "cybersecurity" or "information security."&amp;nbsp;Arguably the challenge for both the technical and non-technical is prioritization - failing to understand how a vulnerability impacts an organization.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 18:09:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5524#M737</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2018-01-24T18:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5538#M740</link>
      <description>&lt;P&gt;Fully agreed - Yeah...French isn't a 'Lingua Franca' because it was too precious about staying pure - or at least those in charge of it were.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;'Cyber' and 'Hacker' are lost as they mean something very different now, so I wouldn't burn the energy - unless it's in the service of comedy I'd recommend looking at the concept of 'Globish' as this makes super good sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately the security buzzword generator now seems to be hosting malware...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2018 05:39:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5538#M740</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-01-25T05:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5547#M741</link>
      <description>&lt;P&gt;Recycling or reuse of TLAs (Three Letter Acronyms).&amp;nbsp; IAM is a good one.&amp;nbsp; Words too, 'Asset' means different things to executives versus IT folks.&amp;nbsp; Can be the physical machines, or something much less tangle like reputation.&amp;nbsp;&lt;BR /&gt;Also technical terms from other areas like 'Polyinstantiation' often cause misunderstandings.&amp;nbsp; Often recycling activities or concepts, but simply replacing the name, or using a catchy nickname instead of a more descriptive (and often more accurate) name.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2018 21:27:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5547#M741</guid>
      <dc:creator>Edd</dc:creator>
      <dc:date>2018-01-25T21:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5552#M742</link>
      <description>I think acronym overload is on the fault of computing as much as it is the press... try to debug layer two issues on an apple device without very specific google-fu due to MAC/Mac.&lt;BR /&gt;&lt;BR /&gt;Or layer2 encryption MACsec, where both MAC addresses and cryptographic Message Authentication Codes (MACs) are actually relevant (makes searching a document more difficult)</description>
      <pubDate>Fri, 26 Jan 2018 00:33:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/5552#M742</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-26T00:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/11714#M2378</link>
      <description>&lt;P&gt;Since I (literally) "&lt;A href="http://www.amazon.com/exec/obidos/ASIN/1597491152/robsladesinterne" target="_blank"&gt;wrote the book&lt;/A&gt;" on security terminology, I'd love to join the game.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll start with "social engineering."&amp;nbsp; I mean, really, what we have here is just a fancy term for "lying" most of the time, isn't it?&amp;nbsp; As far as I'm concerned, we are giving the bad guys way too much credit for simple fibs.&amp;nbsp; (Yeah, I'm a teacher, and I know enough psychology and sociology to know that social engineering can be a lot more complicated, and useful, than that.&amp;nbsp; But it isn't the way we apply it to the bad guys.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another one the drives me up the wall is APT, or "Advanced Persistent Threat."&amp;nbsp; Just break it down: "Advanced" - we didn't think of this first.&amp;nbsp; "Persistent" - we didn't fix it, so they came back.&amp;nbsp; "Threat" - they did something bad.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Somebody has mentioned cloud.&amp;nbsp; Did you know cloud is actually an acronym?&amp;nbsp; Standing for "Could Lose Our Under Drawers"?&amp;nbsp; We had cloud for decades.&amp;nbsp; We called it time-sharing, or distributed computing, or thin client, etc.&amp;nbsp; It just means "using someone else's computer."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(I give you Slade's Law of Computer History - Those who fail to learn the lessons of computer history are doomed to buy it again--repackaged.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another whole category that bugs me is marketing terms.&amp;nbsp; One example: you know what IDS is, right?&amp;nbsp; Intrusion detection system.&amp;nbsp; No problem.&amp;nbsp; You know what IPS means?&amp;nbsp; Whatever the vendor says it means.&amp;nbsp; Search through the security literature and you will find all kinds of descriptions of intrusion prevention systems--no two alike.&amp;nbsp; Does it discard packets? Does it analyse packets? Does it block packets?&amp;nbsp; Depends on which vendor you ask, and what &lt;STRONG&gt;their&lt;/STRONG&gt; "IPS" does.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jun 2018 17:58:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/11714#M2378</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-06-21T17:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/11744#M2387</link>
      <description>&lt;P&gt;Sometimes it's not funny.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was at a meeting the other day where the topic was "risk management."&amp;nbsp; That's central to what we do, but I realized that there wasn't much commonality to the definition of the term.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The meeting was sponsored by a business continuity group.&amp;nbsp; They were definitely thinking about risks on the "A" point of the CIA triad.&amp;nbsp; Most of us in information security tend to emphasize the confidentiality part.&amp;nbsp; (Actually, my background started in in malware research, and we were really keen on integrity--it's one of the three key means of virus detection.)&amp;nbsp; BC/DR people tend to lump confidentiality into a special corner of what they would call reputational risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There were some bankers there.&amp;nbsp; When the banks (or others from fintech) talk about risk, it means capital risk.&amp;nbsp; All of what we consider risk management they tend to put in a box called operational risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And then there is management.&amp;nbsp; I don't really understand why management shuts down every time we talk about risk.&amp;nbsp; If you are a manager, of anything, you manage two things: people, and risk.&amp;nbsp; Management is managing business risk every minute of every day--they just do it "by the seat of their pants" rather than using formal tools.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very often we need to enlarge our concept of the terms we use ...&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 18:11:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/11744#M2387</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-06-22T18:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology ('Risk')</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/11747#M2388</link>
      <description>&lt;P&gt;-&lt;/P&gt;&lt;P&gt;&amp;nbsp; I've found that it -sometimes- helps in the discussion on 'Risk Management' to break it down into 3 parts:&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1- Risk Identification:&amp;nbsp; Identifying and documenting a particular threat to an asset help set the stage;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2- Risk Assessment:&amp;nbsp; &amp;nbsp;After Identification, coming up with some way to quantify or rank risks helps;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 3- Risk Mitigation:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;After the previous two steps, coming up with either a plan to lower the risk or to&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;document the acceptance of the risk is essential.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I'm basing this on my own experience of always insisting that risk is the likelihood of a threat to an asset manifesting. So this hinges upon the definitions of 'threats' and 'assets'.&amp;nbsp; Hopefully 'likelihood' is not a point of disagreement.&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 18:42:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/11747#M2388</guid>
      <dc:creator>Edd</dc:creator>
      <dc:date>2018-06-22T18:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: Egregious misuse of cyber security terminology</title>
      <link>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/11934#M2448</link>
      <description>&lt;P&gt;I'd love to, but it's so prevalent I would have no time left for getting work done!&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jun 2018 17:28:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Egregious-misuse-of-cyber-security-terminology/m-p/11934#M2448</guid>
      <dc:creator>green20151</dc:creator>
      <dc:date>2018-06-30T17:28:12Z</dc:date>
    </item>
  </channel>
</rss>

