A cybersecurity style guideOn February 25, 2018 by Kenna
Information security firm Bishop Fox’s “Cybersecurity Style Guide” is 92 pages’ worth of usage notes from the confusing world of technical jargon, a combination of glossary, pronunciation guide and style manual (in the manner of the jargon file), and includes the notation that “cyber-” is an ill-advised prefix.
They’re open to your suggestions for additions, amendments, etc. It’s pretty comprehensive, with entries for “Cylon” (“Fictional cyborgs in Battlestar Galactica”), “Grumpy Cat,” “Life hack,” “EFF,” and “Kubernetes or k8s.”
This guide is designed for security researchers. It provides advice on which words to use in reports, how they should look in the middle of a sentence, and how to pronounce them out loud. Since the terms are listed alphabetically, you’ll find serious usage advice right next to playful entries about internet culture. Each term in the guide earned its place by being unintuitive in some way:
• It may look like a non- technical word (execute, pickling, shell),
• It may be uniquely written (BeEF, LaTeX, RESTful),
• It may not follow a clear pattern (web page vs. website),
• It may have a very specific technical distinction (invalidated vs. unvalidated),
• Or its meaning may change depending on the context (crypto, PoC, red teaming)
Hello World! Introducing the Bishop Fox Cybersecurity Style Guide [Brianne Hughes/Bishop Fox]
(via Beyond the Beyond)
New Jersey State Senator Jeff Van Drew wants to run for Congress as a Democrat; he visited 17-year-old Emily McGrath’s school, Egg Harbor Township High, where McGrath questioned him about whether he’d taken money from the NRA; Van Drew said he hadn’t, and he was lying.
The late, lamented Scottish writer Iain Banks (previously) was several kinds of writer, but one of his main claims to fame is his role in developing the idea of fully automated luxury communism, in his beloved Culture novels, a series of wildly original space operas about a post-singularity, post-scarcity cooperative galactic civilization devoted to games, […]
Connecting voting machines to the internet is a terrible idea: the machines are already notoriously insecure, and once they’re online, anyone, anywhere in the world becomes a potential attacker.
Surfing on public Wi-Fi is convenient, but it’s far from safe. Whether you’re at a cafe or hotel, connecting to an unsecured network exposes you—and your personal information—to a host of hazards, including hackers, government spies, and trackers. Private Internet Access helps you navigate past these risks and tap into a safer, restriction-free internet, and […]
The web is vast, and while there’s room for everyone, competition is stiff when it comes to landing on that first page of a Google search. That’s why developers aren’t afraid to spend exorbitant amounts of time and money on search engine optimization (SEO) to ensure their sites rank higher than others. However, not all […]
Many of us enjoy the aesthetic of vintage electronics, but trying to use most hardware from the 1950’s isn’t necessarily practical. This is especially true where speakers are concerned. While most of us can appreciate the old-school feel of retro speakers, they have a hard time matching the convenience and power delivered by today’s Bluetooth speakers. […]