This Policy Set was developed based on recommendations from the EDUCAUSE IT Communications CG Coffee Shop on Oct. 6, 2020 (with the support of many other CGs). The purpose is to reduce

Checks in this Policy Set

  • blackbox

    • Potential Alternative Terminology: closed box, mystery box

  • blackhat hacker

    • Potential Alternative Terminology: criminal, unethical hacker

  • blacklist

    • Potential Alternative Terminology: block list or denied

  • grandfather

    • Potential Alternative Terminology: legacy

  • gray hat hacker

    • Potential Alternative Terminology: hacktivist

  • master/slave

    • Potential Alternative Terminology:

      • primary/replica

      • parent/child

      • active/passive

      • primary/secondary

      • trunk/branch

  • whitelist

    • Potential Alternative Terminology: allow list or approved

  • white hat hacker

    • Potential Alternative Terminology: ethical hacker

  • red team

    • Potential Alternative Terminology: open box, clear box

  • yellow team

    • Potential Alternative Terminology: DevSecOps team

  • white team

    • Potential Alternative Terminology: cyber exercise cell

  • gray beard

    • Potential Alternative Terminology: the individual’s name

  • mob programming

    • Potential Alternative Terminology: team, swarm, troop

  • whitespace

    • Potential Alternative Terminology: empty space

Did this answer your question?