Style Guide
Famous Hackers
Cyber Cinema
Cyber Hygiene
Legends
200

For numbers within paragraphs, use the spelled-out form for these numbers.

1-10

200

In 1981, he was charged with stealing computer manuals from Pacific Bell. In 1982, he hacked the North American Defense Command (NORAD), an achievement that inspired the 1983 film War Games.

Kevin Mitnick

200

For one thousand dollars a day, guests of a futuristic theme park can visit recreations of different time periods and experience their wildest fantasies with lifelike androids.

Westworld

200

The process of identifying, analyzing and evaluating risk.

Risk Assessment

200

Often referred to as a “Father of the Internet,” he developed the more advanced Transmission Control Protocol (TCP) and the Internet Protocol (IP) systems.


Vinton G. Cerf

400
The default font for all documentation. 

Calibri

400

This group took issue with the Church of Scientology and begin disabling their websites, thus negatively impacting their search rankings in Google and overwhelming its fax machines with all-black images.

Anonymous

400

In a dystopian world, society is closely monitored by Big Brother, an omnipotent force for government surveillance. One man breaks the rules by falling in love and must pay a heavy price.

1984

400

A set of changes to a computer program or its supporting data designed to update, fix, or improve it.

Patch Management

400

In 1981, while still in graduate school, he introduced the first version of the Emacs text editor, designed to run on a Unix-based system. He would later become best known as the developer of the Java programming language.

James Gosling

600

According to most style guides these types of words are capitalized in titles; therefore, they are capitalized under tables and figures in BLS documentation. 

 Nouns, pronouns, verbs, adjectives, and adverbs

600

Also known as "Mafiaboy," this hacker discovered how to take over networks of university computers. He used their combined resources to disrupt the number-one search engine at the time: Yahoo. Within one week, he'd also brought down Dell, eBay, CNN and Amazon using a distributed-denial-of-service (DDoS) attack that overwhelmed corporate servers and caused their websites to crash.


Michael Calce

600

One of the earliest hacking films. A computer engineer learns an executive at his company has been stealing his work and is launched into the world of virtual reality.


Tron


600

An electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence

Multi-Factor Authentication

600

He created what is now known as the Linux kernel in 1991, while still an undergraduate at the University of Helsinki.

Linus Torvalds

800

The international date format used.


YYYY-MM-DD

800

On June 1, 1990, this hacker took over all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing that he would be the 102nd caller and win the prize of a Porsche 944 S2. 

Kevin Poulsen

800

A computer-powered MRI machine extracts a serial murderer’s soul, and becomes a deadly technological weapon.

Ghost in the Machine

800

A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates.

Public Key Infrastructure

800

With his strong background in cryptography, he developed a tool to fight against the Cascade virus when his computer became infected with it. That's where the idea for his own company came.

Eugene Kaspersky

1000

Use this timezone for reporting time stamps of events to clients in 24 hour format.


Universal Time Coordinated (UTC)

1000

Known as "Solo" on the internet, he allegedly coordinated what would become the largest military computer hack of all time. 

Gary McKinnon

1000

M16, the newly created British intelligence agency, recruits a mathematician and his team to crack the Germany’s Enigma code during World War II.  

The Imitation Game

1000

A specific form of application firewall that filters, monitors, and blocks HTTP traffic to and from a web service

Web Application Firewall

1000

Known as the “Father of Expert Systems,” he led the DENDRAL project at Stanford beginning in 1965, which was the first practical expert system.

Edward A. Feigenbaum

M
e
n
u