Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Version 2.0

Cybersecurity Style Guide

Symbols and Numbers

0-day (n. or adj.)

A “zero-day” or “oh-day” finding is one that has not been previously reported. In formal writing, it’s better to use zero-day finding, previously undisclosed vulnerability, or publicly undisclosed vulnerability.

1080i, 1080p

HD video modes that describe the frame resolution and scan type (interlaced or progressive scan, respectively). Pronounced “ten-eighty-eye” and “ten-eighty-pea.” Do not spell out.

1Password

Password management software.

2600

A hacker magazine founded in 1984. Also a series of local clubs. https://www.2600.com/

Related:

2FA or TFA (n.)

Two-factor authentication. Spell out on first use.

3DES

Triple DES. A symmetric key block cipher. DES is pronounced as letters or “dezz.”

Related:

3G, 4G (adj. or n.)

Third- and fourth-generation communications technology. Cell phone network options. Do not spell out.

3Scale

An API management platform.

4chan

A website for trolls and memes that birthed Anonymous and Rickrolling.

7-Zip

An open source file archiver.

8.3 filename (n.)

A shortened filename. Also called a short-name.

*

The asterisk.

@

The at sign.

!

The exclamation point, exclam, or bang.

Related:

/

The forward slash. Avoid using the forward slash in formal writing to compare two things outside of set phrases like and/or, client/server, and TCP/IP.

#

The pound sign, hash, or hashtag. Only called hashtag when tagging something. This character and [ ] are sometimes used interchangeably and are pronounced as “sharp” in programming language names.

'

The tic. Not an apostrophe.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.