Afleveringen
-
An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
Zijn er afleveringen die ontbreken?
-
Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A clandestine set of applications designed to give hackers access and control over a target device.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A set of behaviors that precisely describes a cyber adversary attack campaign.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices -
The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses.
CyberWire Glossary link: https://thecyberwire.com/glossary/chaos-engineering
Audio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL https://fs.blog/mental-model-scientific-method/
Learn more about your ad choices. Visit megaphone.fm/adchoices - Laat meer zien