1. EachPod
EachPod
Word Notes - Podcast

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

Technology News Tech News
Update frequency
every 7 days
Average duration
6 minutes
Episodes
272
Years Active
2020 - 2025
Share to:
man trap (noun)

man trap (noun)

A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the e…
00:04:42  |   Tue 25 Aug 2020
anagram (noun)

anagram (noun)

A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams. Learn more about your ad choic…
00:03:34  |   Tue 18 Aug 2020
rogue access point (noun)

rogue access point (noun)

1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless a…
00:04:07  |   Tue 11 Aug 2020
darknet (noun)

darknet (noun)

A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy design…
00:04:47  |   Tue 11 Aug 2020
phishing (verb)

phishing (verb)

From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive i…
00:04:17  |   Tue 11 Aug 2020
credential stealing (verb)

credential stealing (verb)

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hac…
00:03:49  |   Tue 11 Aug 2020
The Bombe (noun)

The Bombe (noun)

An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordo…
00:04:15  |   Tue 11 Aug 2020
cross-site scripting (noun)

cross-site scripting (noun)

From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90%…
00:03:46  |   Tue 11 Aug 2020
penetration test (noun)

penetration test (noun)

The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military cir…
00:04:08  |   Tue 11 Aug 2020
social engineering (noun)

social engineering (noun)

The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. T…
00:04:10  |   Tue 11 Aug 2020
zero-day (adjective)

zero-day (adjective)

A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment…
00:03:57  |   Tue 11 Aug 2020
NMAP (noun)

NMAP (noun)

A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyo…
00:03:53  |   Tue 11 Aug 2020
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.