DZone
Security Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Security Zone > 5 Security Industry Buzzwords We Love to Hate

5 Security Industry Buzzwords We Love to Hate

When you hear people around town talking about 'cyber this,' 'cloud that,' or 'hackers' does it make you cringe? We feel your pain.

Sakthi Mohan user avatar by
Sakthi Mohan
·
Jun. 18, 17 · Security Zone · Opinion
Like (2)
Save
Tweet
2.25K Views

Join the DZone community and get the full member experience.

Join For Free

Image title

Computing security is an interesting space. One of the main aspects that makes it interesting is that there are many security terms that are ambiguous. With some words, we have no idea why we’ve come to use them! While these buzzwords aren’t going away anytime soon, here is a list of buzzwords that most of the security industry loves to hate:

100% Secure

Your security is only as good as your weakest link. It’s obvious to the current security world that there is no such thing as 100% secure. However, some organizations guarantee on their website that they are indeed 100% secure. This may seem like a good marketing strategy to attract customers who may not know much about security. It’s also asking for trouble when security professionals notice a claim like this. It is best to steer clear of this term.

Hacker

When we think of a hacker by that name, a criminal computer nerd comes to mind. You know, the dark shadowy figure in a hoodie that’s sitting behind a fancy laptop. The same figure who steals bank account details with the intention of wreaking high-tech havoc.

In reality, a hacker is contrary to this connotation. Hackers are people who think of ways to use software and applications beyond their intended purpose. They invent and create without following the rules. Ethical hackers, while they don’t follow the rules, do abide by the law.

Cyber

The term “cyber” is often overused and ambiguous. It can refer to the internet, digital, IT, computers, and even virtual reality. It doesn’t really have a strong meaning of its own. Since it refers to a broad range of other things, avoid using such an amorphous term within the security space.

Cloud

Discussing the “cloud” isn’t only disliked by security folks, but also by the majority of people in tech. The term is highly overused. It’s much clearer to refer to it as Software as a Service (SaaS) rather than discussing cloud computation.

Gamification

When you hear this term, you probably imagine video games. However, when using this term in a professional setting, many organization’s aren’t interested in adopting gamification. The term is associated with fun, not with work.

The actual meaning of gamification is to motivate and engage someone to do something that is considered not so interesting to do. It is often misunderstood, and actually pretty appealing if you ask me. Fun, games, and productivity? Why not!

Summing Up

Every industry has buzzwords. While most are nice and catchy, there are also the dated, meaningless, and overused words. Be wary of the confusing terms that demand clarification. Beware of the misleading and unattractive terms. There’s a time and place for buzzwords. In the security industry, stick to unambiguous terms that suit such a scientific industry.

security

Published at DZone with permission of Sakthi Mohan, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • How To Integrate Third-Party Login Systems in Your Web App Using OAuth 2.0
  • Which JVM Version Is the Fastest?
  • Debugging the Java Message Service (JMS) API Using Lightrun
  • 10 Books Every Senior Engineer Should Read

Comments

Security Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo