top of page
  • Satellite Evolution

New WTA report, “The Cybersecurity Buzzwords Every Manager Needs to Know,” provides guidance into ke


New WTA report, “The Cybersecurity Buzzwords Every Manager Needs to Know,” provides guidance into key cybersecurity terms

The World Teleport Association (WTA) today released The Cybersecurity Buzzwords Every Manager Needs to Know, a new research report that serves as a guide to terms that managers are most likely to encounter when grappling with cyberthreats and the practices and technologies that protect against them. “Cybersecurity is filled with buzzwords,” said executive director and report author Robert Bell. “They mean something important to practitioners, but they can be a real barrier to understanding for the managers who have to make cybersecurity decisions, even if their expertise is in finance, sales or satellite technology. We select 13 terms that are in most common use and provide plain English explanations of them and why they matter.” WTA members can access the report by signing in to their accounts on the WTA website. The report is available free and exclusively to WTA Members. Members may directly download the report by following this link. [if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f"> <v:stroke joinstyle="miter"></v:stroke> <v:formulas> <v:f eqn="if lineDrawn pixelLineWidth 0"></v:f> <v:f eqn="sum @0 1 0"></v:f> <v:f eqn="sum 0 0 @1"></v:f> <v:f eqn="prod @2 1 2"></v:f> <v:f eqn="prod @3 21600 pixelWidth"></v:f> <v:f eqn="prod @3 21600 pixelHeight"></v:f> <v:f eqn="sum @0 0 1"></v:f> <v:f eqn="prod @6 1 2"></v:f> <v:f eqn="prod @7 21600 pixelWidth"></v:f> <v:f eqn="sum @8 21600 0"></v:f> <v:f eqn="prod @7 21600 pixelHeight"></v:f> <v:f eqn="sum @10 21600 0"></v:f> </v:formulas> <v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"></v:path> <o:lock v:ext="edit" aspectratio="t"></o:lock> </v:shapetype><v:shape id="_x0000_s1026" type="#_x0000_t75" alt="" href="https://worldteleport.us1.list-manage.com/track/click?u=8041ef61c508dee9ec23494f8&amp;id=c3d4754218&amp;e=8d858155aa" target="&quot;_blank&quot;" style='position:absolute;margin-left:61.3pt; margin-top:0;width:112.5pt;height:144.75pt;z-index:251658240; mso-wrap-distance-left:0;mso-wrap-distance-top:0;mso-wrap-distance-right:0; mso-wrap-distance-bottom:0;mso-position-horizontal:right; mso-position-horizontal-relative:text;mso-position-vertical-relative:line' o:allowoverlap="f" o:button="t"> <v:imagedata src="https://mcusercontent.com/8041ef61c508dee9ec23494f8/images/d6c4f4a5-52f1-43cd-81d9-4685ecb63d6a.png"></v:imagedata> <w:wrap type="square"></w:wrap> </v:shape><![endif][if !vml][endif]Like every technology field, cybersecurity is filled with buzzwords. They have vital meaning to practitioners – but they can also be a barrier to understanding for managers who have to make decisions about cybersecurity based on their knowledge of finance, sales or satellite communications. Drawing on the expertise of cybersecurity professionals and educators, WTA offers this guide to terms you are most likely to encounter when grappling with cyberthreats and the practices and technologies that protect against them. The terms addressed in this guide include Code Injection, Distributed Denial of Service, Domain Name Server, Keylogging, Multi-factor Authentication, Packet Sniffing, Penetration Testing, Secure Socket Layer, Spoofing, Trojan, Virus, Virtual Private Networks and Worm. [if !supportLineBreakNewLine] [endif]

bottom of page