• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

7 Common Cybersecurity Portmanteaus: Their Meanings Explained

7 Common Cybersecurity Portmanteaus: Their Meanings Explained

Portmanteau. What a word. A quick google image search yields a collection of very fine old-timey leather traveling bags, but that’s not the subject of this post. An alternative meaning, courtesy of the Merriam-Webster online dictionary, is “a word or morpheme whose form and meaning are derived from a blending of two or more distinct forms (such as smog from smoke and fog).”

Hope that’s clear enough for a start. The first usage of the word in such a way comes from Lewis Carroll’s novel Through the Looking Glass way back in 1871, where Humpty Dumpty describes to Alice the usefulness of “two meanings packed into one word.”

While the word “mimsy” (“flimsy” and miserable”) may have fallen out of fashion since Carroll’s time, portmanteaus are prospering in the internet age, with such recent gems like “spork” (“spoon” and “fork”) and Brangelina (“Brad Pitt” and “Angelina Jolie”) dominating pre-packaged meal sets and tabloid headlines respectively.

Why do we use portmanteaus? The more optimistic among us would say that its because we strive for efficiency in writing and speech and can turn two words and their accompanying concepts into a single one that ends up being more than the sum of its parts. The less optimistic would say that its because we’re lazy and can’t be bothered to speak and write in a formally complete way. Regardless, the cybersecurity world is replete with creative portmanteaus, so it pays to at least familiarize yourself with the most common ones you might encounter.

That’s exactly what’s we’ve tried to do here. So, without further adieu, here is a list of the seven most common cybersecurity portmanteaus and their meanings so that you too can feel in with the times and add some new entries to your internet slang (netslang?) lexicon.

1. Malware: Malicious Software

This portmanteau likely needs the least explanation on this list, as malware has been causing headaches and inducing hard drive reformats for quite some time now. Whether in the form of viruses, worms, trojan horses or spyware, malware is good at one thing only: getting into your computer system and wreaking its own unique brand of havoc on the systems and files you hold dear.

2. Hacktivism: Hack Activism

 Hacktivism is often carried out by anonymous hackers Hacktivism is often carried out by anonymous hackers

It’s surprising that this portmanteau doesn’t get more use in the press, as recent years have seen the likes of Wikileaks and various political hacking stories dominating news cycles. Hacktivism refers specifically to any act of hacking for the purposes of political or social change, although where cyberterrorism fits in this often varies depending on who you ask. In any case, this one seems more likely than not to pick up steam, as the activities it describes only seem to be growing in frequency and importance.

3. Sporgery: Spam Forgery

Like with hacktivism, sporgery takes on increased cultural relevance thanks to the current spotlight surrounding the phenomenon of “fake news.” Sporgery itself involves the posting of a huge amount of web content onto some news-related platform along with misleading or outright untrue headlines to distract or misdirect from the poster’s true identity and intentions. The purpose is often to discredit the reputation of members in a newsgroup and essentially shut down their speech, whether directly through flooding the group with posts or indirectly through the hit on their reputation. A high-profile early case of sporgery involves the Church of Scientology.

4. Mutex: Mutual Exclusion Object

A bit on the specialist side, mutex refers to a “mutual exclusion” programming object which acts as a counterpoint through which different program threads can share access to some resource, such as a file or folder. The mutex restricts access to a single program thread at a time, hence the “exclusion” aspect. If this all sounds like Greek to you, you can find some good analogies to get a basic understanding of what a mutex does in this Stack Overflow thread.

5. Brogrammer: Bro Programmer

Ditching the stereotype of anti-social nerds who prefer isolation with the coding language of their choice, brogrammers take the world of programming into the frat house. Such guys, in the now infamously sarcastic words of Facebook engineer Nick Schrock, “rage on PHP, rage in the gym and rage at the club.” Despite starting out as a joke Facebook page made by Schlock, people started believing it and translated the concept into reality, arguably to the detriment of us all.

6. Netiquette: Network Etiquette

Netiquette represents the commonly understood social rules governing online behavior. If this was ever real in the first place, it is rapidly fading from our cultural conscience with the advent of trolling and flame wars. The basic idea of netiquette is that the internet is an extension of our world and not some completely separate entity, and so the values that we accept and practice in our daily lives also apply to behavior on the internet as well. Do unto others as you would have others do unto you, which means no stealing, lying, cheating or abusive behavior on the internet. Yea, like that’s going to happen anytime soon.

7. Malvertising: Malicious Advertising

A booming practice nowadays, malvertising refers to the “injection of unwanted or malicious code into ads.” Surprisingly, even the advertisement creators and host websites remain unaware of this infiltration, and ad networks must work overtime to catch and take down any of their products which may contain malicious scripts. Common programs that are most easily exploitable by malvertising include Adobe Flash, Oracle Java, and Microsoft Silverlight, so make sure they’re up to date on your computer or running only when required to minimize your risk of infection.

Like infamous texting shortcuts like “LOL,” “IMHO,” “IDK,” and “SMH,” portmanteaus are ever-evolving, with new ones being coined constantly and no signs of slowing down anytime soon. On one hand, it’s too soon to say that our language as we know it will be entirely replaced by such linguistic shortcuts, but it seems undeniable that we’re heading in that direction when the word “mansplain” (“man” and “explain”) has been added to the 2018 Merriam-Webster dictionary.

But it’s not all bad, as there are some actual benefits to the abbreviations. The added efficiency applies not only to the time it takes to speak, write and read, but also saves precious bandwidth in the process, which is a net positive for anyone who uses the internet.

We hope you found this rundown of the most common cybersecurity portmanteaus useful. Please feel free to share with your friends if you found this interesting and keep on the lookout for more interesting portmanteaus whenever they may pop up!

Related


 

The Myth of the Cybersecurity Skills Gap


 

Why Skipping a Cybersecurity Degree is Good for Your Career and Pocket Book


 

Cybersecurity Paper Tigers are Killing Us


 

How to Easily Use LinkedIn to Maximize Job Opportunities


 

CISM vs CISSP: How to Decide Which is Best for You


 

3 Little Known Techniques CISSPs Use to Find Jobs


 

Linux: You’ve Come a Long Way, Baby!


 

How to Build a Cybersecurity Career Path Post Graduation


 

5 Cybersecurity Certifications That Employers Are Looking For


 

How to Get into Cybersecurity

Tags: brogrammerhacktivismmalvertisingMalwaremutexnetiquetteportmanteausporgery
Share

You also might be interested in

Replace Windows Task Manager with Process Explorer for Easy Malware Detection

Replace Windows Task Manager with Process Explorer for Easy Malware Detection

Feb 15, 2016

The 8 Most Common Cyber Attacks and How to Stop Them
Glittering blue stamp: Cyber warfare background with some smooth lines

The 8 Most Common Cyber Attacks and How to Stop Them

Aug 11, 2018

Malware Research Explained, Part 1

Malware Research Explained, Part 1

May 14, 2019

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company

Prev Next