DiscoverWord Notes
Word Notes
Claim Ownership

Word Notes

Author: CyberWire, Inc.

Subscribed: 31Played: 810
Share

Description

A fun and informative cybersecurity audio glossary from the CyberWire.

40 Episodes
Reverse
From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.
Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
SOC Triad (noun)

SOC Triad (noun)

2021-02-1604:51

A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.
taint analysis (noun)

taint analysis (noun)

2021-02-0203:50

The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
ATM skimming (noun)

ATM skimming (noun)

2021-01-2604:27

The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.
APT side hustle (noun)

APT side hustle (noun)

2021-01-1904:59

A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.
endpoint (noun)

endpoint (noun)

2021-01-1205:35

A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
Daemon (noun)

Daemon (noun)

2020-12-2904:19

An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
greyware (noun)

greyware (noun)

2020-12-2204:48

Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.
fuzzing (noun)

fuzzing (noun)

2020-12-1504:45

An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
Unix (noun)

Unix (noun)

2020-12-0804:45

A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
rootkit (noun)

rootkit (noun)

2020-11-2406:27

A clandestine set of applications designed to give hackers access and control over a target device.
A set of behaviors that precisely describes a cyber adversary attack campaign.
Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
identity theft (noun)

identity theft (noun)

2020-11-0303:30

In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
The Malware Mash!

The Malware Mash!

2020-10-3003:05

A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.
loading
Comments 
Download from Google Play
Download from App Store