Why we need a more coherent approach in the language we use to describe cyber security attacks.