Why "translating"
The IT jargon used daily may be foreign to a reader coming from a different profession, who might not understand what we mean by a certain term.

Here we intend to make a sort of “intralingual translation” by using certain analogies that are close to the terms that, in our view, decision makers should know in order to fully understand the risks ahead and the possible solutions.

Glossary

Hackers

Story has it that the word “hacker” was originally used to call those persons who would like to fuss with machines, devices or gadgets in order to find in them a new functionality which, when created, was not devised to perform, i.e. to bring out extra capacities or practicalities beyond its specifications.

In time, the term was transformed, turned over, twisted and reasocciated until our days, when it transpires multiple concepts and hues. Socially, the term “hacker” started to be associated to what we IT security experts call an attacker or a cybercriminal and therefore it has acquired a negative connotation

http://www.newyorker.com/tech/elements/a-short-history-of-hack

Cibercriminal

Persons who use Information Technology means to commit crimes. Nowadays, there are organized groups that have found in the vulnerabilities of the global IT system an opportunity to easily generate millions of dollars without having to expose themselves physically.

Vulnerable

Software, hardware, persons, organizations, systems that are capable of being altered.

Vulnerability

Process by which a system can be altered.

To exploit a vulnerability

The action of altering a system.

Backdoor

Backdoor refers to the unlocked door at the rear of a large property which can be easily trespassed once its existence is known.

Firewall

If we make an analogy with postal mail, it would be the mail employee who allows letters and packages to be admitted (or not) according to preestablished rules applied on the addresser and addressee.