20 episodes

A fun and informative cybersecurity audio glossary from the CyberWire.

Word Notes CyberWire, Inc.

    • Technology
    • 5.0 • 6 Ratings

A fun and informative cybersecurity audio glossary from the CyberWire.

    Virtual Private Network (VPN) (noun)

    Virtual Private Network (VPN) (noun)

    A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.

    • 5 min
    Network Time Protocol (NTP) attack (noun)

    Network Time Protocol (NTP) attack (noun)

    A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.

    • 6 min
    smishing (SMS phishing) (noun)

    smishing (SMS phishing) (noun)

    From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 

    • 4 min
    port mirroring (noun)

    port mirroring (noun)

    A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 

    • 4 min
    Network Detection and Response (NDR) (noun)

    Network Detection and Response (NDR) (noun)

    NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. 

    • 5 min
    shadow IT (noun)

    shadow IT (noun)

    Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. 

    • 4 min

Customer Reviews

5.0 out of 5
6 Ratings

6 Ratings

Top Podcasts In Technology