{"id":411,"date":"2021-06-29T08:52:09","date_gmt":"2021-06-29T07:52:09","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=411"},"modified":"2021-06-29T08:53:33","modified_gmt":"2021-06-29T07:53:33","slug":"commonly-misused-terms-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/commonly-misused-terms-in-cybersecurity\/","title":{"rendered":"Commonly Misused Terms in Cybersecurity"},"content":{"rendered":"\n<p>Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Here are list of some commonly misused terms in the field of cybersecurity (these are unofficial descriptions that are meant to be informative):<\/p>\n\n\n\n<p>D<strong><em>ata vs. Information vs. Knowledge<\/em><\/strong><\/p>\n\n\n\n<p><em>Data<\/em> is usually considered the bits and bytes that information is composed of. <em>Information<\/em> turns multiple bits and bytes into something useful. For example, a temperature sensor may read \u201c102,\u201d but <em>information<\/em> tells us that it\u2019s 102 degrees Fahrenheit on a temperature sensor that was in a human\u2019s mouth. <em>Knowledge<\/em> is what allows <em>information<\/em> to turn into action. It says that 102 degrees Fahrenheit for a human being is much too hot. The lines between <em>data<\/em>, <em>information<\/em> and <em>knowledge<\/em> are blurry, but there are some who argue those lines fiercely.<\/p>\n\n\n\n<p><strong><em>Threat vs. Risk<\/em><\/strong><\/p>\n\n\n\n<p>A <em>threat<\/em> is either used to mean something bad that could happen or an entity that may cause something bad to happen (also called a \u201cthreat actor\u201d). <em>Risk<\/em> includes the probability that the bad thing could happen and the potential result(s). People often (incorrectly) use these words interchangeably.<\/p>\n\n\n\n<p><strong><em>Risk Management<\/em><\/strong><\/p>\n\n\n\n<p>The process of responding to the potential that something bad might happen. There are generally four options: accept the risk, transfer it, avoid it or mitigate it. Depending on who you talk to, there are at least <a href=\"https:\/\/simplicable.com\/new\/risk-response\" target=\"_blank\" rel=\"noreferrer noopener\">eight options<\/a>, but these are the traditional four. When a cybersecurity person talks risk management, they may be referring to the process laid out in the <a href=\"https:\/\/csrc.nist.gov\/projects\/risk-management\/about-rmf\" target=\"_blank\" rel=\"noreferrer noopener\">Risk Management Framework<\/a>.<\/p>\n\n\n\n<p><strong><em>Cybersecurity<\/em><\/strong><\/p>\n\n\n\n<p>Basically, the protection of computer systems (including networks, the internet and anything \u201csmart\u201d). However, it has been used as an umbrella term that also encompasses information assurance, data protection and privacy. This term will likely keep changing until somebody can adequately explain what \u201ccyber\u201d is.<\/p>\n\n\n\n<p><strong><em>Information Assurance (or Security)<\/em><\/strong><\/p>\n\n\n\n<p>The protection of any facts, news, knowledge, or sometimes data, in any form \u2013 paper, electronic, stone tablet, signals, memorized, etc. Often confused with and put under the cybersecurity umbrella.<\/p>\n\n\n\n<p><strong><em>Standard<\/em><\/strong><\/p>\n\n\n\n<p>The word <em>standard<\/em> can be used to mean a level of quality or an accepted norm. <\/p>\n\n\n\n<p><strong><em>Requirements vs. Controls<\/em><\/strong><\/p>\n\n\n\n<p>Both of these terms can be used to identify specific activities, processes, practices or capabilities an organization may have or do to manage their cybersecurity risk. <em>Controls<\/em> may or may not be mandatory, whereas <em>requirements<\/em> generally are. <\/p>\n\n\n\n<p><strong><em>Audit vs. Assessment<\/em><\/strong><\/p>\n\n\n\n<p>In cybersecurity, the term <em>audit<\/em> often has a more formal and negative undertone than in some other disciplines. <em>Audits<\/em> are done after an incident such as a data breach (generally an internal audit), at the request of a customer (usually an external audit conducted by the customer), or to obtain a certification (a third-party audit). <em><a href=\"https:\/\/www.linkedin.com\/pulse\/anatomy-security-assessment-ron-ross\/\" target=\"_blank\" rel=\"noreferrer noopener\">Assessments<\/a><\/em> are typically, but not always, more like a friendly health check-up. Encompassing any number of activities, assessments can be narrow or broad, with as much rigor as the company being assessed desires, or is appropriate to the situation. One exception to this general rule is in the Cybersecurity Maturity Model Certification (CMMC) program, which uses the word <em>assessment<\/em> as the formal method by which a company is evaluated.<\/p>\n\n\n\n<p><strong><em>Compliance<\/em><\/strong><\/p>\n\n\n\n<p><em>Compliance<\/em> typically refers to meeting a requirement (internal or external, sometimes regulatory) and often is shown with a certification or attestation of some sort.<\/p>\n\n\n\n<p><strong><em>Summary<\/em><\/strong><\/p>\n\n\n\n<p>Words in English evolve almost as quickly as memes on the internet. In the field of cybersecurity, it seems this is done with reckless abandon. But understanding some of these<a href=\"https:\/\/csrc.nist.gov\/glossary\" data-type=\"URL\" data-id=\"https:\/\/csrc.nist.gov\/glossary\" target=\"_blank\" rel=\"noreferrer noopener\"> key terms<\/a> and how they are used will help in understanding and communicating your cybersecurity needs. <a href=\"https:\/\/www.nist.gov\/blogs\/manufacturing-innovation-blog\/commonly-misused-terms-cybersecurity?utm_medium=email&amp;utm_source=marketingcloud&amp;utm_campaign=\" data-type=\"URL\" data-id=\"https:\/\/www.nist.gov\/blogs\/manufacturing-innovation-blog\/commonly-misused-terms-cybersecurity?utm_medium=email&amp;utm_source=marketingcloud&amp;utm_campaign=\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">How Can ITM Help You?<\/h5>\n\n\n\n<p>iTM covers all aspects of Cyber Security including but not limited to Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations, Cloud security best practice &amp; architecture and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. <a rel=\"noreferrer noopener\" href=\"https:\/\/www.itminister.co.uk\/contact.html\" target=\"_blank\">Contact Us <\/a>for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Here are list of some commonly misused terms in the field of cybersecurity (these are unofficial descriptions that are meant to be informative): Data vs. Information vs. Knowledge Data is usually considered the bits and bytes that information is &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/commonly-misused-terms-in-cybersecurity\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Commonly Misused Terms in Cybersecurity&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[18,23],"tags":[],"class_list":["post-411","post","type-post","status-publish","format-standard","hentry","category-cyber-security-best-practice","category-cyber-security-research"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=411"}],"version-history":[{"count":3,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/411\/revisions"}],"predecessor-version":[{"id":414,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/411\/revisions\/414"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}