Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
FAQs about Word Notes:How many episodes does Word Notes have?The podcast currently has 300 episodes available.
October 20, 2020Virtual Private Network (VPN) (noun)A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network. Learn more about your ad choices. Visit megaphone.fm/adchoices...more7minPlay
October 13, 2020Network Time Protocol (NTP) attack (noun)A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims. Learn more about your ad choices. Visit megaphone.fm/adchoices...more7minPlay
October 06, 2020smishing (SMS phishing) (noun)From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. Learn more about your ad choices. Visit megaphone.fm/adchoices...more5minPlay
September 29, 2020port mirroring (noun)A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. Learn more about your ad choices. Visit megaphone.fm/adchoices...more5minPlay
September 22, 2020Network Detection and Response (NDR) (noun)NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. Learn more about your ad choices. Visit megaphone.fm/adchoices...more7minPlay
September 15, 2020shadow IT (noun)Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. Learn more about your ad choices. Visit megaphone.fm/adchoices...more5minPlay
September 08, 2020remote access Trojan or RAT (noun)From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998. Learn more about your ad choices. Visit megaphone.fm/adchoices...more5minPlay
September 01, 2020business email compromise or BEC (noun)A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. Learn more about your ad choices. Visit megaphone.fm/adchoices...more4minPlay
August 25, 2020man trap (noun)A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons. Learn more about your ad choices. Visit megaphone.fm/adchoices...more5minPlay
August 18, 2020anagram (noun)A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams. Learn more about your ad choices. Visit megaphone.fm/adchoices...more4minPlay
FAQs about Word Notes:How many episodes does Word Notes have?The podcast currently has 300 episodes available.