202 episodes

A fun and informative cybersecurity audio glossary from N2K.

Word Notes N2K Networks

    • Technology
    • 5.0 • 18 Ratings

A fun and informative cybersecurity audio glossary from N2K.

    Encore: greyware (noun)

    Encore: greyware (noun)

    Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min
    Encore: fuzzing (noun)

    Encore: fuzzing (noun)

    An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min
    Encore: Unix (noun)

    Encore: Unix (noun)

    A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min
    Encore: deep packet inspection (DPI) (noun)

    Encore: deep packet inspection (DPI) (noun)

    A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 5 min
    Encore: rootkit (noun)

    Encore: rootkit (noun)

    A clandestine set of applications designed to give hackers access and control over a target device.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 6 min
    Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]

    Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]

    A set of behaviors that precisely describes a cyber adversary attack campaign.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 6 min

Customer Reviews

5.0 out of 5
18 Ratings

18 Ratings

[REDACTED] USER ,

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

Jedi Wannabi ,

Keeping an old man up to date.

Great little info chunks that keep me from feeling like Steve Buscemi's, "Hello, fellow kids!"

Meatball_army ,

Rick is great. Good show.

Who you calling a nerd? I love the “nerd reference” section! HA! Really like to have a straight forward context for some words or phrases I pretend to understand but don’t really... should be required listening for all in infosec.

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
The Neuron: AI Explained
The Neuron
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times

You Might Also Like

CyberWire Daily
N2K Networks
Hacking Humans
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis