1. EachPod
EachPod
Word Notes - Podcast

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

Technology News Tech News
Update frequency
every 7 days
Average duration
6 minutes
Episodes
272
Years Active
2020 - 2025
Share to:
non-fungible tokens (NFT) (noun)

non-fungible tokens (NFT) (noun)

Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind. Learn more about your ad choices. Visit megapho…
00:05:34  |   Tue 25 May 2021
multi-factor authentication (noun)

multi-factor authentication (noun)

The use of two or more verification methods to gain access to an account. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:01  |   Tue 18 May 2021
machine learning (noun)

machine learning (noun)

A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience. Learn more about your ad choices. Visit…
00:06:16  |   Tue 11 May 2021
intelligence (noun)

intelligence (noun)

The process of turning raw information into intelligence products that leaders use to make decisions with. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:05:56  |   Tue 04 May 2021
SaaS (noun)

SaaS (noun)

A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any devic…
00:06:04  |   Tue 27 Apr 2021
brute-force attack (noun)

brute-force attack (noun)

A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered. Learn more about your ad choices. Visit megaphone.fm/adc…
00:06:32  |   Tue 20 Apr 2021
decryption (noun)

decryption (noun)

A process of converting encrypted data into something that a human or computer can understand. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:07:28  |   Tue 13 Apr 2021
denial-of-service attack (noun)

denial-of-service attack (noun)

A cyber attack designed to impair or eliminate access to online services or data. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:37  |   Tue 06 Apr 2021
cold boot attack (noun)

cold boot attack (noun)

A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal se…
00:06:59  |   Tue 30 Mar 2021
cloud computing (noun)

cloud computing (noun)

On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer. Learn more a…
00:06:16  |   Tue 23 Mar 2021
APT (noun)

APT (noun)

An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operati…
00:06:52  |   Tue 16 Mar 2021
backdoor (noun)

backdoor (noun)

An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:05:54  |   Tue 09 Mar 2021
watering hole attack (noun)

watering hole attack (noun)

From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.…
00:05:30  |   Tue 02 Mar 2021
network telescope (noun)

network telescope (noun)

Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena. Learn more abo…
00:05:18  |   Tue 23 Feb 2021
SOC Triad (noun)

SOC Triad (noun)

A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log. Learn more a…
00:05:21  |   Tue 16 Feb 2021
supply chain attacks (noun)

supply chain attacks (noun)

Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim'…
00:05:28  |   Tue 09 Feb 2021
taint analysis (noun)

taint analysis (noun)

The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways. Learn more about your ad choi…
00:04:20  |   Tue 02 Feb 2021
ATM skimming (noun)

ATM skimming (noun)

The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine. Learn more about your ad choices. Visit megaphone.fm/adc…
00:04:57  |   Tue 26 Jan 2021
APT side hustle (noun)

APT side hustle (noun)

A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:05:29  |   Tue 19 Jan 2021
endpoint (noun)

endpoint (noun)

A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack. Learn more about y…
00:06:05  |   Tue 12 Jan 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.