Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:


The Information Security Dictionary -- a compendium about the terms of IT-Security


Defining over 1,200 of the most commonly used words in the security field

The newly released Information Security Dictionary (1st Edition) (published by Springer Science) offers information security experts, systems analysts, policy makers, managers and students a reference tool to find the most commonly used terms in the field. The dictionary defines these terms in easy to understand language, provides more detail in Tables and easy cross-referencing leading the reader to related terms if need be.

Details about the book:

Gattiker, Urs E. (2004) The Information Security Dictionary Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology Series : The Kluwer International Series in Engineering and Computer Science (Springer Science - Foundations of Computing , Vol. 767. ISBN: 1-4020-7927-3. Available at bookstores near you, online booksellers and from the publisher at:,,5-156-22-33310929-0,00.html

The dictionary is published both in electronic and printed form, thereby offering users easy online searches as well as finding the terms online. As Professor Urs E. Gattiker (Ph.D.) from the security portal CASEScontact reported, the idea of the dictionary was based on his experience attending various security conferences that often neither panel members nor the audience were always sure about the terminology being discussed.

In contrast to established disciplines, information security experts have the challenge to work in a rapidly developing field that has yet to find a shared vocabulary. In turn, it is often difficult for experts and users alike to be sure that one understands certain concepts fully without referring to a reference document. The Information Security Dictionary is a handy tool that provides one with the definitions of over 1,200 items most often used by system administrators, software engineers and security experts. What makes the dictionary especially helpful is it being:

* concise,
* providing help for non-technical users, as well as
* depth for experts (e.g., different types of worms, viruses, hacking attacks are defined), and
* links and references to related terms (e.g., virus and worms

How Does it Work?

The Information Security Dictionary is published both in electronic as well as a hardover printed version. The electronic version provides for easy online searching while the hardcover copy can be used in one’s reference library. Besides providing the reader with information about related terms so additional information is easily found, the dictionary offers the reader extensive appendices providing links and information to:

* glossaries and news information regarding cybersecurity,
* tools and software sites enabling one to better protect critical systems,
* information about new regulation regarding e-commerce, privacy, and telecommunication,
* standards, and
* newsletters, alerts and skill development tools and tricks regarding information security.

The Information Security Dictionary focuses on concepts rather than implementation.


"IT security is a newly emerging discipline that is of utmost importance in a world, where we are becoming ever more dependent on information that is being transported and/or stored on: residential computers, including notebooks and personal digital assistants (PDA), in data warehouses and also a country’s critical infrastructure. Unfortunately, it is sometimes difficult to keep track of new terminology or have two experts agree on how to define the problem. This further complicates matters for users and decision-makers alike. The Dictionary tries to reduce this confusion and bring in a bit of order" said Urs E. Gattiker, Professor for Management and Information Sciences at ISNM.

"The Information Security Dictionary is based on our need for reducing complexity by sharing a vocabulary that facilitates communicating about a complex matter, while helping to better protect critical infrastructure and information."

"Often it is difficult for an educated reader to understand journal articles or books dealing with security issues because it is unclear how the author may have defined certain terminology " states Gattiker, Professor for Management and Information Sciences at ISNM and director of CASEScontact in Germany. "But a system administrator trying to convince top management of the need for additional vigilance regarding security needs to be able to explain basic terminology to an audience that is focusing on the bottom line. This is where the Information Security Dictionary comes in."

Professor Urs Gattiker | idw
Further information:

More articles from Information Technology:

nachricht Fraunhofer FIT joins Facebook's Telecom Infra Project
25.10.2016 | Fraunhofer-Institut für Angewandte Informationstechnik FIT

nachricht Stanford researchers create new special-purpose computer that may someday save us billions
21.10.2016 | Stanford University

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Etching Microstructures with Lasers

Ultrafast lasers have introduced new possibilities in engraving ultrafine structures, and scientists are now also investigating how to use them to etch microstructures into thin glass. There are possible applications in analytics (lab on a chip) and especially in electronics and the consumer sector, where great interest has been shown.

This new method was born of a surprising phenomenon: irradiating glass in a particular way with an ultrafast laser has the effect of making the glass up to a...

Im Focus: Light-driven atomic rotations excite magnetic waves

Terahertz excitation of selected crystal vibrations leads to an effective magnetic field that drives coherent spin motion

Controlling functional properties by light is one of the grand goals in modern condensed matter physics and materials science. A new study now demonstrates how...

Im Focus: New 3-D wiring technique brings scalable quantum computers closer to reality

Researchers from the Institute for Quantum Computing (IQC) at the University of Waterloo led the development of a new extensible wiring technique capable of controlling superconducting quantum bits, representing a significant step towards to the realization of a scalable quantum computer.

"The quantum socket is a wiring method that uses three-dimensional wires based on spring-loaded pins to address individual qubits," said Jeremy Béjanin, a PhD...

Im Focus: Scientists develop a semiconductor nanocomposite material that moves in response to light

In a paper in Scientific Reports, a research team at Worcester Polytechnic Institute describes a novel light-activated phenomenon that could become the basis for applications as diverse as microscopic robotic grippers and more efficient solar cells.

A research team at Worcester Polytechnic Institute (WPI) has developed a revolutionary, light-activated semiconductor nanocomposite material that can be used...

Im Focus: Diamonds aren't forever: Sandia, Harvard team create first quantum computer bridge

By forcefully embedding two silicon atoms in a diamond matrix, Sandia researchers have demonstrated for the first time on a single chip all the components needed to create a quantum bridge to link quantum computers together.

"People have already built small quantum computers," says Sandia researcher Ryan Camacho. "Maybe the first useful one won't be a single giant quantum computer...

All Focus news of the innovation-report >>>



Event News

#IC2S2: When Social Science meets Computer Science - GESIS will host the IC2S2 conference 2017

14.10.2016 | Event News

Agricultural Trade Developments and Potentials in Central Asia and the South Caucasus

14.10.2016 | Event News

World Health Summit – Day Three: A Call to Action

12.10.2016 | Event News

Latest News

Greater Range and Longer Lifetime

26.10.2016 | Power and Electrical Engineering

VDI presents International Bionic Award of the Schauenburg Foundation

26.10.2016 | Awards Funding

3-D-printed magnets

26.10.2016 | Power and Electrical Engineering

More VideoLinks >>>