• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Trends
  • Home
  • / ...
  • /Tech News
  • /Trends

And Cybersecurity Is?

By Jeffrey Voas, FIEEE

By Jeffrey Voas, FIEEE on
September 30, 2019
Cybersecurity MonthCybersecurity Month Cybersecurity is an overused term.  It is aged. It is worn out.  It lacks technical meaning. It became popularized during decades of continuous, successful hacking events such as ransomware attacks, data breaches, network intrusions, spyware, etc. It became a well-known word to the general public through the media that reported on the seemingly endless thefts of personal data due to corporations that failed to secure the data of their customers.  But in the end, it still always lacked technical meaning and definition. I have not recently looked, but I assume that by now, it has fallen off the “hype curve” for technical terms.   It has become one of those terms whose definition and meaning is “in the eye of the beholder.” When a term gets to that point, it loses impact, and becomes passé.

Want more tech news? Subscribe to ComputingEdge Newsletter Today!


It would be great to see one or more replacement terms begin to become socialized and then popularized.  For example, if data breaches are a great (or the greatest) concern, why don’t we have a term like “cyber privacy”?  And what about those many similar terms that get tossed around interchangeably, some with definitions, and others that are once again “in the eye of the beholder”: attack, threat, vulnerability, weakness, bug, fault, defect, failure, etc.? Might those terms be employed and lessen my concern about this one word? To be honest, I do not know. But we need more accurate terms and definitions if we are ever to do better science.  And this challenge is a computer science and math problem. Also note that I can just as easily argue against myself. Are terms like cyber-trust, cyber-threats, cyber-weaknesses, cyber-bugs, or cyber-vulnerabilities any better? I certainly am not suggesting that sticking the term “cyber” onto the front of any noun helps this dilemma.  But I feel that there must be some term or terms that are better to fight this relentless problem. The bottom line here is that “umbrella” terms like “cybersecurity” do not lead researchers, practitioners, and the general public into any real understanding of the fundamental issues related to malicious behavior and malicious intent. Refreshing terms from time to time is usually futile and frustrating, but I think for this one it might be timely and beneficial.
LATEST NEWS
How to Evaluate LLMs and GenAI Workflows Holistically
How to Evaluate LLMs and GenAI Workflows Holistically
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

How to Evaluate LLMs and GenAI Workflows Holistically

The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent

Exploring the Elegance and Applications of Complexity and Learning in Computer Science

IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award

IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol

Celebrate IEEE Day 2025 with the IEEE Computer Society

Building Community Through Technology: Sardar Patel Institute of Technology (SPIT) Student Chapter Report

IEEE CS and ACM Announce Recipients of 2025 George Michael Memorial HPC Fellowship