Word Notes

Advertise on podcast: Word Notes

Rating
5
from
18 reviews
This podcast has
192 episodes
Language
Publisher
Explicit
No
Date created
2020/07/20
Average duration
7 min.
Release period
9 days

Description

A fun and informative cybersecurity audio glossary from N2K.

Social media

Check Word Notes social media presence


Podcast episodes

Check latest episodes from Word Notes podcast


Encore: smishing (SMS phishing) (noun)
2024/02/20
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s.  Learn more about your ad choices. Visit megaphone.fm/adchoices
more
Encore: port mirroring (noun)
2024/02/13
A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in.  Learn more about your ad choices. Visit megaphone.fm/adchoices
more
Encore: Network Time Protocol (NTP) attack (noun)
2024/02/06
A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims. Learn more about your ad choices. Visit megaphone.fm/adchoices
more
Encore: smishing (SMS phishing) (noun)
2024/01/30
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s.  Learn more about your ad choices. Visit megaphone.fm/adchoices
more
Encore: port mirroring (noun)
2024/01/23
A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in.  Learn more about your ad choices. Visit megaphone.fm/adchoices
more
Encore: Network Detection and Response (NDR) (noun)
2024/01/16
NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013.  Learn more about your ad choices. Visit megaphone.fm/adchoices
more
Encore: shadow IT (noun)
2024/01/09
Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems.  Learn more about your ad choices. Visit megaphone.fm/adchoices
more
chaos engineering (noun)
2023/12/19
The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses. CyberWire Glossary link: https://thecyberwire.com/glossary/chaos-engineering Audio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL https://fs.blog/mental-model-scientific-method/ Learn more about your ad choices. Visit megaphone.fm/adchoices
more
Encore: remote access Trojan or RAT (noun)
2023/12/12
From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998. Learn more about your ad choices. Visit megaphone.fm/adchoices
more
zero knowledge proof (noun)
2023/12/05
A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true. CyberWire Glossary link: https://thecyberwire.com/glossary/zero-knowledge-proof Audio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL https://www.youtube.com/watch?v=5qzNe1hk0oY Learn more about your ad choices. Visit megaphone.fm/adchoices
more
Encore: business email compromise or BEC (noun)
2023/11/28
A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.  Learn more about your ad choices. Visit megaphone.fm/adchoices
more
HIPAA (noun)
2023/11/21
A U.S. law designed to improve the portability and accountability of health insurance coverage. CyberWire Glossary link: https://thecyberwire.com/glossary/hipaa Audio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL https://www.youtube.com/shorts/Ksk00s8a_IU Learn more about your ad choices. Visit megaphone.fm/adchoices
more

Podcast reviews

Read Word Notes podcast reviews


5 out of 5
18 reviews
[REDACTED] USER 2023/09/13
I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.
I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.
Jedi Wannabi 2021/09/01
Keeping an old man up to date.
Great little info chunks that keep me from feeling like Steve Buscemi's, "Hello, fellow kids!"
Meatball_army 2020/11/09
Rick is great. Good show.
Who you calling a nerd? I love the “nerd reference” section! HA! Really like to have a straight forward context for some words or phrases I pretend to...
more
GottaRun21 2020/10/28
What did that mean? Now I know.
Aha! At last a quick and easy way to learn what that language means without having to ask my colleagues a dumb question or trusting a Web search. The ...
more
Frogstar5 2020/10/28
Helping me learn the language of cybersecurity!
These short, super bingeable episodes are awesome! It’s helpful to have an audio glossary like this to learn the key industry terms, not to mention so...
more
check all reviews on aple podcasts

Podcast sponsorship advertising

Start advertising on Word Notes & sponsor relevant audience podcasts


What do you want to promote?

Ad Format

Campaign Budget

Business Details