For numbers within paragraphs, use the spelled-out form for these numbers.
1-10
In 1981, he was charged with stealing computer manuals from Pacific Bell. In 1982, he hacked the North American Defense Command (NORAD), an achievement that inspired the 1983 film War Games.
Kevin Mitnick
For one thousand dollars a day, guests of a futuristic theme park can visit recreations of different time periods and experience their wildest fantasies with lifelike androids.
Westworld
The process of identifying, analyzing and evaluating risk.
Risk Assessment
Often referred to as a “Father of the Internet,” he developed the more advanced Transmission Control Protocol (TCP) and the Internet Protocol (IP) systems.
Vinton G. Cerf
Calibri
This group took issue with the Church of Scientology and begin disabling their websites, thus negatively impacting their search rankings in Google and overwhelming its fax machines with all-black images.
Anonymous
In a dystopian world, society is closely monitored by Big Brother, an omnipotent force for government surveillance. One man breaks the rules by falling in love and must pay a heavy price.
1984
A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
Patch Management
In 1981, while still in graduate school, he introduced the first version of the Emacs text editor, designed to run on a Unix-based system. He would later become best known as the developer of the Java programming language.
James Gosling
According to most style guides these types of words are capitalized in titles; therefore, they are capitalized under tables and figures in BLS documentation.
Nouns, pronouns, verbs, adjectives, and adverbs
Also known as "Mafiaboy," this hacker discovered how to take over networks of university computers. He used their combined resources to disrupt the number-one search engine at the time: Yahoo. Within one week, he'd also brought down Dell, eBay, CNN and Amazon using a distributed-denial-of-service (DDoS) attack that overwhelmed corporate servers and caused their websites to crash.
Michael Calce
One of the earliest hacking films. A computer engineer learns an executive at his company has been stealing his work and is launched into the world of virtual reality.
An electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence
Multi-Factor Authentication
He created what is now known as the Linux kernel in 1991, while still an undergraduate at the University of Helsinki.
Linus Torvalds
The international date format used.
YYYY-MM-DD
On June 1, 1990, this hacker took over all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing that he would be the 102nd caller and win the prize of a Porsche 944 S2.
Kevin Poulsen
A computer-powered MRI machine extracts a serial murderer’s soul, and becomes a deadly technological weapon.
Ghost in the Machine
A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates.
Public Key Infrastructure
With his strong background in cryptography, he developed a tool to fight against the Cascade virus when his computer became infected with it. That's where the idea for his own company came.
Eugene Kaspersky
Use this timezone for reporting time stamps of events to clients in 24 hour format.
Universal Time Coordinated (UTC)
Known as "Solo" on the internet, he allegedly coordinated what would become the largest military computer hack of all time.
Gary McKinnon
M16, the newly created British intelligence agency, recruits a mathematician and his team to crack the Germany’s Enigma code during World War II.
The Imitation Game
A specific form of application firewall that filters, monitors, and blocks HTTP traffic to and from a web service
Web Application Firewall
Known as the “Father of Expert Systems,” he led the DENDRAL project at Stanford beginning in 1965, which was the first practical expert system.
Edward A. Feigenbaum