Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Version 2.0

Cybersecurity Style Guide

V

Vagrant

Software for building virtual development environments.

values

If writing about a type of value, use the normal font. If it’s a specific value, use the tech font, as in “licenseID value.”

Related:

Vault

Software for secrets management created by HashiCorp.

VB.NET

Short for Visual Basic .NET. A programming language.

Related:

VBScript

A Microsoft scripting language based on Visual Basic.

VC (n.)

Venture capital. Pronounced as letters or the phrase. Spell out on first use.

Related:

VDI (n.)

Virtual desktop infrastructure. Spell out on first use.

Related:

vendor (n.)

A third-party business that provides a service or product to a client.

Related:

Venmo

A mobile payment service.

VeraCrypt

Disk encryption software.

verbose (adj.)

Verbose logs, banners, and error messages reveal more information about underlying structures to users than is necessary.

version numbers

Use the normal font for software version numbers, product model numbers, serial numbers, and builds. Avoid using “v” to stand for version in formal writing.

Ex: jQuery 3.5.0, SSL 2, Nmap 7.80

VGA

Video Graphics Array. A graphics standard and video output connector. Do not spell out.

via, vias (n.)

A physical component of a chip.

victim (n.)

Avoid using this term. Try user, patient, customer, consumer, or target.

Vim

A text editor.

Vimeo

A video-sharing company.

Viptela

A Cisco SD-WAN service.

Related:

WAN
viral (adj.)

Rapidly popular, especially online. Or related to viruses.

Related:

vishing (n.)

Short for voice phishing. A type of social engineering attack that uses telephony to impersonate legitimate callers. Spell out on first use.

VLAN, VLANs (n.)

Virtual local area network. Pronounced as “V-lan.”

VLCM (n.)

Vulnerability Lifecycle Management. Spell out on first use.

VM, VMs (n.)

Virtual machine. Spell out on first use in public-facing documents.

VNC

Virtual Network Computing. Spell out on first use.

VoIP

Voice over Internet Protocol. Pronounced as “voyp.” Spell out on first use.

VPC (n.)

Virtual private cloud. Spell out on first use.

VPN, VPNs (n.)

Virtual private network. Spell out on first use.

VR (n.)

Virtual reality.

VSA, VSAs (n.)

Vendor security assessment. Spell out on first use.

Vuforia

An AR platform.

vulnerability or vuln (n.)

Any condition, configuration, or state that increases an asset’s logical, informational, or physical exposure to loss of availability, integrity, or confidentiality. Vuln is informal.

vulnerability scan (n.)

An assessment of a target using automated tools to detect security weaknesses.

Related:

vulnerability scanner (n.)

An automated application or system designed to assess computers, computer systems, networks, or applications for weaknesses.

Related:

VulnHub

A site where pen testers can practice.

Related:

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.