1. EachPod
EachPod
Word Notes - Podcast

Word Notes

A fun and informative cybersecurity audio glossary from N2K.

Technology News Tech News
Update frequency
every 7 days
Average duration
6 minutes
Episodes
272
Years Active
2020 - 2025
Share to:
Encore: smishing (SMS phishing) (noun)

Encore: smishing (SMS phishing) (noun)

From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into re…
00:04:37  |   Tue 20 Feb 2024
Encore: port mirroring (noun)

Encore: port mirroring (noun)

A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and…
00:04:37  |   Tue 13 Feb 2024
Encore: Network Time Protocol (NTP) attack (noun)

Encore: Network Time Protocol (NTP) attack (noun)

A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destinatio…
00:06:37  |   Tue 06 Feb 2024
Encore: smishing (SMS phishing) (noun)

Encore: smishing (SMS phishing) (noun)

From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into re…
00:04:37  |   Tue 30 Jan 2024
Encore: port mirroring (noun)

Encore: port mirroring (noun)

A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and…
00:04:37  |   Tue 23 Jan 2024
Encore: Network Detection and Response (NDR) (noun)

Encore: Network Detection and Response (NDR) (noun)

NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and clou…
00:06:19  |   Tue 16 Jan 2024
Encore: shadow IT (noun)

Encore: shadow IT (noun)

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitione…
00:04:54  |   Tue 09 Jan 2024
chaos engineering (noun)

chaos engineering (noun)

The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses. CyberWire Glossary …
00:10:31  |   Tue 19 Dec 2023
Encore: remote access Trojan or RAT (noun)

Encore: remote access Trojan or RAT (noun)

From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made …
00:04:42  |   Tue 12 Dec 2023
zero knowledge proof (noun)

zero knowledge proof (noun)

A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statem…
00:06:40  |   Tue 05 Dec 2023
Encore: business email compromise or BEC (noun)

Encore: business email compromise or BEC (noun)

A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.  Learn more ab…
00:03:47  |   Tue 28 Nov 2023
HIPAA (noun)

HIPAA (noun)

A U.S. law designed to improve the portability and accountability of health insurance coverage. CyberWire Glossary link: https://thecyberwire.com/glossary/hipaa Audio reference link: Dr. Dana Brems, …
00:10:03  |   Tue 21 Nov 2023
Encore: man trap (noun)

Encore: man trap (noun)

A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the e…
00:04:42  |   Tue 14 Nov 2023
Common Vulnerability Scoring System (CVSS) (noun)

Common Vulnerability Scoring System (CVSS) (noun)

A qualitative public framework for rating the severity of security vulnerabilities in software. CyberWire Glossary link: https://thecyberwire.com/glossary/common-vulnerability-scoring-system Audio re…
00:07:36  |   Tue 07 Nov 2023
Encore: anagram (noun)

Encore: anagram (noun)

A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams. Learn more about your ad choic…
00:03:34  |   Tue 31 Oct 2023
Encore: zero-day (adjective)

Encore: zero-day (adjective)

A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment…
00:03:57  |   Tue 24 Oct 2023
extended detection response (XDR) (noun)

extended detection response (XDR) (noun)

A unified security incident detection and response platform that connects to multiple tools in the security stack via APIs, collects telemetry from each, and attempts to correlate that telemetry into…
00:08:20  |   Tue 17 Oct 2023
Encore: social engineering (noun)

Encore: social engineering (noun)

The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. T…
00:04:10  |   Tue 10 Oct 2023
joint cyber defense collaborative (JCDC) (noun)

joint cyber defense collaborative (JCDC) (noun)

A cyber information-sharing U.S. Government organization designed to foster the public-private partnership. CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborativ…
00:07:25  |   Tue 03 Oct 2023
Encore: penetration test (noun)

Encore: penetration test (noun)

The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military cir…
00:04:08  |   Tue 26 Sep 2023
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.