Bishop Fox Cybersecurity Style Guide
How do you pronounce SQL? Should you write denial of service with hyphens? Is it pen testing or pentesting? In the evolving world of information security, it’s hard to know who to turn to for answers to questions like these. Through research and internal discussions over the last two years, they have come to a consensus about how to answer these kinds of questions for themselves. They have compiled 1,775 security terms into one document that they are calling the Cybersecurity Style Guide, and they are very excited to share Version 1 of that guide with you. This style guide is not a dictionary — their goal here is to give guidance about usage, not to define the terms in detail. Each term in the guide earned its place by being unintuitive in some way. From malicious viruses to viral memes, our guide reflects the terms that security researchers are likely to use in their technical reports, blogs, and presentations. This will be added to Privacy Resources Subject Tracer™. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to the tools section of Research Resources Subject Tracer™.