The Vocabularist: How We Use The Word ‘Cyber’

The prefix "cyber-" is now a handy way of denoting words to do with the Internet - from cybercrime, cyberbullying and cybersecurity to improbable activities such as cybersnogging. It followed an eventful path to reach its modern meaning.

In ancient Greek kubernao meant "steer a ship" and kubernetes was a steersman. Homer tells how the gods smote Odysseus's ship, so that the toppling mast crushed the steersman's head (kuberneteo kephalen).

The normal Latin transliteration of kubernetes gives us "cybernetes" - though practical seafaring Romans worried less about the rules and turned kubernao into guberno, from which we get "govern".

Plato used "kubernetika" to mean skill in steering, and in the 1940s the American mathematician, Norbert Wiener, derived from it "cybernetics" to mean "control and communication theory, whether in the machine or in the animal".

In the popular imagination the term cybernetics and therefore cyber- became associated especially with humanoid robots, or similar controlled creatures such as the Cybermen, who first appeared in Doctor Who in 1966.

Cyber- words became a popular theme to do with robots or near-robots, including Dr Who's enemies the cybermen. In The Hitchhiker's Guide to the Galaxy (1978) the Sirius Cybernetics Corporation calls a robot "Your Plastic Pal Who's Fun To Be With".

The progression from ancient helmsman to comic robot is clear enough and the common theme is control. But how did cyber- go on to its present association with the Internet? The link is the term "cyberspace" - the virtual electronic world in which we explore, play, learn and share information.

Theoreticians of cyberspace such as Howard Rheingold acknowledge that the word comes from the science fiction writing of William Gibson, particularly his 1984 novel Neuromancer.

Its hero longs to return to the online world from which he has been banished, and the book lyrically describes virtual reality folding "through a dozen impossible angles, tumbling away into cyberspace like an origami crane".

But Gibson's account of how he coined the term cyberspace contains a lesson for anyone who reads too much into the derivations of words.

He tells how he needed a "really hot name" for the arena in which his stories would be set, and cyberspace "sounded like it meant something or it might mean something, but as I stared at it, my whole delight was that I knew it meant absolutely nothing".

If he had fancied instead something like "infosphere" or "digiworld", our terminology might be very different.

BBC: http://bbc.in/21t2C6h

« Google's AI Wins Final Go Challenge
AI Is Closer Than We Know… »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Experis

Experis

Experis provide IT resourcing, project solutions and managed services. We enable organizations to cultivate individuals and teams prepared for the digital age.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

B2Bcert

B2Bcert

B2BCERT one of the top companies offering ISO 9001, ISO 14001, ISO 45001, ISO 22000, ISO 27001, ISO 20000,CE Marking, HACCP, and other globally accepted standards and Management solutions.