Word Notes N2K Networks
-
- Technology
-
A fun and informative cybersecurity audio glossary from N2K.
-
Encore: fuzzing (noun)
An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
Encore: Unix (noun)
A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
Encore: deep packet inspection (DPI) (noun)
A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
Encore: rootkit (noun)
A clandestine set of applications designed to give hackers access and control over a target device.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]
A set of behaviors that precisely describes a cyber adversary attack campaign.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
Encore: cyber threat intelligence (CTI) (noun)
Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Customer Reviews
I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.
I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.
Keeping an old man up to date.
Great little info chunks that keep me from feeling like Steve Buscemi's, "Hello, fellow kids!"
Rick is great. Good show.
Who you calling a nerd? I love the “nerd reference” section! HA! Really like to have a straight forward context for some words or phrases I pretend to understand but don’t really... should be required listening for all in infosec.