Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
Comments sought: the silence is deafening.
Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
--
You received this message because you are subscribed to the Google Groups "Cybersecurity hyperglossary" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hyperglossar...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAOX%2BAR7%3DXpWBKXRge-vMr_EJJ5c-ALFGoa4ZLfrDtEQDPB1ziQ%40mail.gmail.com.
Marty Carter
Director | Information Security Consultant
--
You received this message because you are subscribed to the Google Groups "Cybersecurity hyperglossary" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hyperglossar...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAPRmHF4n3fmo_1WVe7cxyps5%2Br1BqKY8QRnvcKDNb9KONyhDpg%40mail.gmail.com.
Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CA%2BLAF6vcKePK20hiY3HxrTygSXeViS4f6Z%2BQMCTKctO3re%2BYFg%40mail.gmail.com.
Marty Carter
Director | Information Security Consultant
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAPRmHF6Lpqb3mwR%3DNo-Yw4rafHP%3DT1rZmfCu-09Ciuqt%2BfSmkg%40mail.gmail.com.

Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CA%2BLAF6uGeJeEi9Hz__k9pSeDqYGnnLBXV8ybb-6SxFJg4R09Sw%40mail.gmail.com.
Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
--
You received this message because you are subscribed to the Google Groups "Cybersecurity hyperglossary" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hyperglossar...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAOX%2BAR585Dakd%3De2iAGW0Ri3N%3DbzE%3DiqQF5QB2DpNwqDma52yw%40mail.gmail.com.

Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
How's this?Better, worse or about the same?
The attack you’re thinking of is called a 51% attack (also known as a majority attack).
A 51% attack occurs when a single entity or coordinated group gains control of more than half of a blockchain network’s validating power—either:
With that majority, the attacker can effectively control the consensus process and decide which transactions are accepted as valid.
Once majority control is achieved, the attacker can manipulate the blockchain in several ways:
Technically, this works because the network follows the longest (or most-work) chain, so a majority controller can create an alternative chain that overrides the honest one.
Even with majority control, there are limits:
So the attack undermines trust and transaction integrity, rather than directly stealing arbitrary funds.
Blockchains rely on decentralization: no single party should control validation.
A 51% attack breaks that assumption:
It’s essentially this:
If someone controls “most of the vote,” they control “the truth” of the blockchain.
That’s why decentralization—and avoiding concentration of mining or staking power—is critical to cryptocurrency security.
If you want, I can also outline real-world examples where this actually happened (there have been several, especially with smaller coins), or compare it to analogous attacks in traditional distributed systems.
Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
--
You received this message because you are subscribed to the Google Groups "Cybersecurity hyperglossary" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hyperglossar...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAOX%2BAR7r9kkd8jaa5NKKAhvD8WzU2EWxZ6194qbbBx2Nf38ZkQ%40mail.gmail.com.

Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAPRmHF5yVLkpGxE86Hh1Ripk3%3DRoJ%2BaC7h_6uQdhMFbhS7CqsA%40mail.gmail.com.
Gary Hinson CEO of IsecT Ltd
Information risk and security consulting
ISO27k Audit ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAPyqVUqa_83EVgTbbDLbg55K3MAm0b6ZwWz8Erp-afPBYj18OA%40mail.gmail.com.
Hi Gary/Nigel,
I really enjoyed this exchange, especially the ‘screaming banshees’ line, which feels like a pretty accurate reaction to the word cyber if we’re being honest.
I’m in a similar camp. I’ve never been entirely comfortable with the term cybersecurity, because it’s become so elastic that it risks meaning everything and therefore nothing. It often feels like a label people adopt before they’ve fully unpacked what sits underneath it.
This is why the hyperglossary is so important. It provides the cyber-crowd with a well researched point of reference, plus many related, and important cross-referenced contextualised terms to hopefully help them begin to understand what the word really means.
Onwards!
Marty
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAPRmHF5gzNw38ZpoM_CGD%2BHtvc6LfxKUXOZTtxS50d0y3jfxuQ%40mail.gmail.com.
Marty Carter
Director | Information Security Consultant
Gary Hinson CEO of IsecT Ltd
_____________________________________________
Hi Gary/Nigel,
I really enjoyed this exchange, especially the ‘screaming banshees’ line, which feels like a pretty accurate reaction to the word cyber if we’re being honest.
I’m in a similar camp. I’ve never been entirely comfortable with the term cybersecurity, because it’s become so elastic that it risks meaning everything and therefore nothing. It often feels like a label people adopt before they’ve fully unpacked what sits underneath it.
This is why the hyperglossary is so important. It provides the cyber-crowd with a well researched point of reference, plus many related, and important cross-referenced contextualised terms to hopefully help them begin to understand what the word really means.
Onwards!
Marty
On Mon, May 4, 2026 at 04:34 Gary Hinson <ga...@isect.com> wrote:
Thanks Nigel.If I defined "cyber" as "Complex nuisance, cause of the screaming banshees", I suspect it would raise a wry smile for some readers but confuse the majority!I too have long railed against "cyber" ... but couldn't resist using cybersecurity in the book's title, ironically, in the hope of prompting people to look it up, hoping for a nice, clear, succinct definition.I remain intrigued at how the general/commercial and defence worlds use the same term but with differing meanings: a state-sponsored "cyber-attack" on, say, regional power grids or comms networks is a different beast to a "cyber-attack" on, say, a manufacturing or retail company. "Cyberwar" is more than just conventional hacking and malware done big. Commercial antivirus plus an annual cybersecurity awareness session (sheep dip!) is as much use as cardboard-shields on a tank. In a rainstorm.You were nearly a decade ahead of me in 1980. The light flickered on for me when I picked up the concept of securing information of all kinds - not just digital data, IT systems and networks. Working as a sysadmin for a pharmaceuticals company, I was dealing with extremely sensitive and commercially valuable info including pre-patent drug designs and medical research results. The computers were expensive but replaceable, unlike the info.You'll see mentions throughout the hyperglossary of knowledge, intellectual property, trade secrets, even mental health - aspects that the cyber-crowd are either oblivious to or foolishly choose to ignore. Maybe now, with the rise of "cognitive computing" (AI), the penny will drop, for some anyway. Then there's misinformation, disinformation, coercion, deception, insider threats, fraud, camouflage and more. Just try looking those up in other [lesser] cybersecurity textbooks!By the way, "bandwagon fallacy, Argumentum ad populum, and nominalist fallacy" set the hare running: I've included and defined a few recognised biases and the like, so far, but not fallacies as far as I recall. Thanks for the NI* prompt!
* "Nigel Intelligence" or "Neat Idea"____________________________________________
Gary Hinson CEO of
IsecT Ltd
Information risk and security consulting
ISO27k
Audit
ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
On Mon, 4 May 2026 at 04:33, Nigel Landman <nigel....@gmail.com> wrote:
Good morning/evening GaryBlockchain is indeed a bit wow and wierd and so can offer nothing other than to concure with your definition. From a recent Medium article there is suggestion of a 49% attack resulting in a slowing down of network activity, as well as disrupt planning; I cannot vouch for the veracity of this kind of attack.Now, for the cyber thing. Back in 2024 as part of a glossary I was building for my wife I ran into the complex nuisance known as cyber. As with many grey haired types I started my life in this industry back in 1980, so cyber was an ideal morpheme for me to tackle. My research sent me down a rabbit hole and were it not for some brave soul I would still be found running and screaming down the road, flapping my arms like a demented banshee. I am now stuck on three phrases - bandwagon fallacy, Argumentum ad populum, and nominalist fallacy. I will share my research if you like, but I'm pretty sure it will only end up with more screaming banshees.Thank you for your hardwork on the hyperglossary.Go BoksNigel.
On Sat, 2 May 2026 at 06:18, Gary Hinson <ga...@isect.com> wrote:
I find it difficult to understand and explain anything blochain-related in simple terms, but here's a redraft, using the term 'hostile takeover':Kind regards/Ngā mihi,
____________________________________________Gary Hinson CEO of
IsecT Ltd
Information risk and security consulting
ISO27k
Audit
ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
On Wed, 29 Apr 2026 at 09:31, Gary Hinson <ga...@isect.com> wrote:
'Better' = progress = smiles!I spotted some refinements/corrections in there:
- 'network's validating power' could tie this in with the blockchain glossary entry
- 51% attacks can work on proof-of-work and proof-of-stake blockchains (both of which have fairly lengthy entries)
- "the network follows the longest (or most-work) chain, so a majority controller can create an alternative chain that overrides the honest one." is a useful concept but I don't like the wording
- The 'why it works' section is nice. Again, I might fiddle with the wording but it's worth adding something along those lines
- The robot's points about decentralisation and validation are helpful, I think.
It's coming along. Let me mull it over a while, and think about whether related entries also need updating to keep it all in synchThanks Rob. Sorry you had to turn to the dark side. It does feel a bit like consorting with the enemy, and checking everything the robot says takes yet more time.Kind regards/Ngā mihi,
____________________________________________Gary Hinson CEO of
IsecT Ltd
Information risk and security consulting
ISO27k
Audit
ISMS templates and policies
Pragmatic Security Metrics
Cybersecurity Hyperglossary
_____________________________________________
Public Art in PA:https://fibrecookery.blogspot.com/2023/08/public-art-in-port-alberni-introduction.html
How Computers Work [From the Ground Up]https://fibrecookery.blogspot.com/2025/12/how-computers-work-from-ground-up.html
AI topic and series:https://fibrecookery.blogspot.com/2026/01/ai-000-intro-table-of-contents.html
Online Scams and Frauds (OSF) series postings:
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
My ultimate fantasy is having a brain that lets me enjoy being alive.
--
You received this message because you are subscribed to the Google Groups "Cybersecurity hyperglossary" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hyperglossar...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CA%2BLAF6tqry7CNd8n2QurdBpouxvUE-ToG1n5V7n%3D9eNg5NA-7g%40mail.gmail.com.
"Cyber-crowd" isn't in there either, Marty, but I'm tempted to add it.
--
You received this message because you are subscribed to the Google Groups "Cybersecurity hyperglossary" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hyperglossar...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAOX%2BAR7QvvEUtS6Jbig_5kYox4i%3DGePY53xvSo5xW39Z-%2BzJfA%40mail.gmail.com.
Gary Hinson CEO of IsecT Ltd
_____________________________________________
To view this discussion visit https://groups.google.com/d/msgid/hyperglossary/CAPyqVUqYsBaD3hwj9NTNU1nftvr5yHw1uTfgk%2BAvftudC%2BFRBA%40mail.gmail.com.