1. EachPod
EachPod
Word Notes - Podcast

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

Technology News Tech News
Update frequency
every 7 days
Average duration
6 minutes
Episodes
272
Years Active
2020 - 2025
Share to:
unified extensible firmware interface (UEFI) (noun)

unified extensible firmware interface (UEFI) (noun)

An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system. Lea…
00:05:56  |   Tue 05 Jan 2021
Daemon (noun)

Daemon (noun)

An operating system program running in the background designed to perform a specific task when certain conditions or events occur. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:04:49  |   Tue 29 Dec 2020
greyware (noun)

greyware (noun)

Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run…
00:05:18  |   Tue 22 Dec 2020
fuzzing (noun)

fuzzing (noun)

An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it. Learn more ab…
00:05:15  |   Tue 15 Dec 2020
Unix (noun)

Unix (noun)

A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s. Learn more about your ad choices. Visi…
00:05:15  |   Tue 08 Dec 2020
deep packet inspection (DPI) (noun)

deep packet inspection (DPI) (noun)

A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point. Learn more about your ad choices. Visit megap…
00:05:34  |   Tue 01 Dec 2020
rootkit (noun)

rootkit (noun)

A clandestine set of applications designed to give hackers access and control over a target device. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:57  |   Tue 24 Nov 2020
tactics, techniques and procedures (TTPs) (noun)

tactics, techniques and procedures (TTPs) (noun)

A set of behaviors that precisely describes a cyber adversary attack campaign. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:43  |   Tue 17 Nov 2020
cyber threat intelligence (CTI) (noun)

cyber threat intelligence (CTI) (noun)

Information used by leadership to make decisions regarding the cybersecurity posture of their organization. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:02  |   Tue 10 Nov 2020
identity theft (noun)

identity theft (noun)

In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud. Learn more about your ad …
00:04:00  |   Tue 03 Nov 2020
The Malware Mash!

The Malware Mash!

Learn more about your ad choices. Visit megaphone.fm/adchoices
00:03:05  |   Fri 30 Oct 2020
Monte Carlo Simulation (noun)

Monte Carlo Simulation (noun)

A probability simulation technique used to understand the impact of risk and uncertainty in complex problems. Learn more about your ad choices. Visit megaphone.fm/adchoices
00:06:27  |   Tue 27 Oct 2020
Virtual Private Network (VPN) (noun)

Virtual Private Network (VPN) (noun)

A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network. Learn more about your ad c…
00:06:25  |   Tue 20 Oct 2020
Network Time Protocol (NTP) attack (noun)

Network Time Protocol (NTP) attack (noun)

A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destinatio…
00:06:37  |   Tue 13 Oct 2020
smishing (SMS phishing) (noun)

smishing (SMS phishing) (noun)

From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into re…
00:04:37  |   Tue 06 Oct 2020
port mirroring (noun)

port mirroring (noun)

A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and…
00:04:37  |   Tue 29 Sep 2020
Network Detection and Response (NDR) (noun)

Network Detection and Response (NDR) (noun)

NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and clou…
00:06:19  |   Tue 22 Sep 2020
shadow IT (noun)

shadow IT (noun)

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitione…
00:04:54  |   Tue 15 Sep 2020
remote access Trojan or RAT (noun)

remote access Trojan or RAT (noun)

From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made …
00:04:42  |   Tue 08 Sep 2020
business email compromise or BEC (noun)

business email compromise or BEC (noun)

A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.  Learn more ab…
00:03:47  |   Tue 01 Sep 2020
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.