Key terms definitions and guidance (glossary)
by John Bandler
Here is a page to jump off to other "Key terms definition" pages.
Words and terms can be confusing or mean different things to different people, so I started creating webpages to define them for clients, students, and you. I decided to include a glossary in my new book on policies and procedures, and next book on cyberlaw.
By creating these pages, my policies, training materials, and emails can be shorter because I can link to these definitions. A reader who knows what the term means can skip the link, but a reader who wants to understand it better can click and learn more.
Remember, these key terms definitions are short and cannot be expected to capture all nuances of terms and concepts. Words mean different things to different people -- this is what these words mean to me, in the simplest of fashions.
If your organization links to these descriptions, consider them "guidance" (informational and nonbinding) rather than as rigid rules or definitions of the organization.
Key terms definition or article?
It is always a matter of degree on how much to write, and sometimes a "key terms" page evolves into a more complex article. The top of the article will usually include the most important takeaway or definition.
Links
- Other key terms definitions
- Key terms definitions (jump-off page - this article)
- Authentication
- Compliance
- Cybersecurity
- Cybersecurity dial
- Document project management
- Email security
- Information asset
- Information asset inventory
- Information Security
- Information governance
- Management (coming soon)
- Passwords
- People (coming soon)
- Policy (coming soon)
- Procedure (coming soon)
- Project management
- Risk and risk management
- Social engineering
- Training (coming soon)
- Two factor authentication (2FA, MFA, 2 step login)
- Version control
- Writing
- More
- Things to know (another main jump-off page)
- Reliable information
Key terms for policies
Policies should be the right length, not too long, not too short. These key term definitions help make that so.
When I write policies, the appendix may have these definitions ("term guidance and information") as below with the article name and link spelled out.
- Passwords, https://johnbandler.com/passwords/
- Authentication, https://johnbandler.com/authentication/
- Two factor authentication (2FA, Multi factor authentication, MFA, two-step authentication), https://johnbandler.com/two-factor-authentication/
- Cybersecurity dial, https://johnbandler.com/cybersecurity-dial/
- Risk and risk management, https://johnbandler.com/risk/
- Email security, https://johnbandler.com/email-security/
- Information asset, https://johnbandler.com/information-asset/
- Information asset inventory, https://johnbandler.com/information-asset-inventory/
- Social engineering, https://johnbandler.com/social-engineering/
- Information governance, https://johnbandler.com/information-governance/
- Information governance committee, https://johnbandler.com/information-governance-committee/
- Information security coordinator, https://johnbandler.com/information-security-coordinator/
As above, these links and the materials on this site should be considered "guidance" which the organization can follow, adapt, or ignore. For the purpose of an internal policy, they are not "definitions" but informational guidance.
My books with glossaries where these terms and other terms may be provided
- Policies and Procedures Book (includes a glossary with over 40 terms, each with a concise definition, then more information in the main text)
- Cyberlaw Book (coming soon)
Caveat and disclaimer
I cannot guarantee or warrantee these webpages will stay available forever.
Words mean different things to different people. This is simply what these words mean to me, and in the context of my other work.
This page is hosted at https://johnbandler.com/key-terms-definitions, copyright John Bandler, all rights reserved.
Posted 2/11/2024. Updated 10/7/2024