this post was submitted on 16 Jun 2024
229 points (96.7% liked)

Technology

57432 readers
4335 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 2 months ago (1 children)

Well, I'm not a cybersec specialist, but my job requires us to comply with NIST cyber security frameworks, including going through external audits every year. In my opinion, your basic generalities are fine for those not working in that field specifically.

However, for cyber security analysts and other specialists, I think specific subcategories are necessary. The reason being, IT is an absolutely massive field that contains a ton of specialties. As such, that means there are roughly an equal variety of malicious actors in the same field.

There's no such thing really as a general "hacker" anymore. Especially when you take into consideration the rapid expansion of state sponsored cyber attacks/warfare. You'll have specialists for various types of:

  • phishing (e.g. targeting general pop/employees, or those going for specific people)
  • cryptography (e.g. those who try to compromise an org's PKI, or people finding vulns to exploit expired certs like what happened with Azure last year)
  • vuln hunters/exploiters (e.g. people that monitor known vulnerabilities and probe orgs' defenses to see if those vulns are present/unpatched/unmitigated, or even people who try to discover new ones)
  • malware engineers (e.g. fairly self explanatory, but malware is a very broad term and can come in numerous shapes and sizes, like even using infected images on a website to conduct RCE on mobile devices like what happened a year or two ago)

Sorry, tangent is getting a bit long-winded now. Anyway, tldr; general terms are fine for laymen or non-specialists, but more precise terms are beneficial for experts in that field.

[–] sugar_in_your_tea 2 points 2 months ago (1 children)

Sure, specialists can and should use specialized terms. But that's not what articles like this are targeting. Keep that to symposiums and whatnot, and keep the general public vernacular simple to avoid confusion. That's all I'm saying.

[–] [email protected] 1 points 2 months ago* (last edited 2 months ago) (1 children)

Fair point. Though, the source is data center dynamics, which does seem a bit niche.

[–] sugar_in_your_tea 1 points 2 months ago

I suppose, but the article has nothing to do with data centers and is written like any other news article on regular news sites. It's a little more tech focused, but still very accessible.