
Word Notes
7 FOLLOWERS
A fun and informative cybersecurity audio glossary from the CyberWire.
Word Notes
6d ago
A passwordless authentication protocol based on the FIDO2 standard.
CyberWire Glossary link: https://thecyberwire.com/glossary/passkey
Audio reference link: Summers, J., 2023. Google Passkeys Have Arrived (here’s how to use them) [All Things Secured Channel]. YouTube. URL https://www.youtube.com/watch?v=oFO7JgUx-bU.
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more
Word Notes
1w ago
A type of phishing attack that uses QR codes as the lure.
CyberWire Glossary link: https://thecyberwire.com/glossary/qr-code-phishing
Audio reference link: KNR, 2018. Batman The Dark Knight Joker bomb blast by phone calls scene [Video]. YouTube. URL https://www.youtube.com/watch?v=qB_fXfzB4z0.
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more
Word Notes
2w ago
Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain.
Definition two: Determining the responsibility for offensive cyber operations.
CyberWire Glossary link: https://thecyberwire.com/glossary/attribution
Audio reference link: Nunnikhoven, M., 2018. Cybersecurity Basics #9 - Attack Attribution [Video]. YouTube. URL www.youtube.com/watch?v=rlyMz5jN_Vs
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more
Word Notes
3w ago
A type of cyber attack where an attacker sends a targeted and personalized email or other form of communication to a specific individual or a small group of individuals with the intention of tricking them into divulging sensitive information, such as a password, or convincing them to click a malicious link that will enable the attacker to take control of the victim's machine.
CyberWire Glossary link: https://thecyberwire.com/glossary/spearphishing
Audio reference link: Richardson, T., 2014. What is the difference between phishing and spear-phishing? [Video]. YouTube. URL www.youtube.com/watch ..read more
Word Notes
1M ago
The ability to continuously deliver the intended outcome despite adverse cyber events.
CyberWire Glossary link: https://thecyberwire.com/glossary/resiliency
Audio reference link: Cameron, J., 1984. The Terminator [Movie]. IMDb. URL www.imdb.com/title/tt0088247/.
Clip Nation, 2012. The Arnold Schwarzenegger “I’ll Be Back” Supercut [Video]. YouTube. URL www.youtube.com/watch?v=-YEG9DgRHhA.
Coops, C., 2013. Terminator 2 Theme [Video]. YouTube. URL www.youtube.com/watch?v=pVZ2NShfCE8.
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more
Word Notes
1M ago
A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization.
CyberWire Glossary link: https://thecyberwire.com/glossary/security-operations-center
Audio reference link: AT&T Tech Channel, 2012. A tour of AT&T’s Network Operations Center (1979) [Video]. YouTube. URL www.youtube.com/watch?v=cigc3hvMyWw.
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more
Word Notes
1M ago
Defensive cyber operations carried out by U.S. Cyber Command's Cyber National Mission Force, CNMF at the request of allied nations.
CyberWire Glossary link: https://thecyberwire.com/glossary/hunt-forward-operation
Audio reference link: Paul Nakasone, G., 2022. Vanderbilt Summit Keynote [Video]. YouTube. URL www.youtube.com/watch?v=Axg4s9l9wi0.
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more
Word Notes
1M ago
The invisible force that governs the movement of data across networks.
Audio reference link: “Things to Come 1936 - HG Wells.” YouTube, YouTube, 28 Sept. 2011, https://www.youtube.com/watch?v=atwfWEKz00U.
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more
Word Notes
2M ago
The ability of computers to execute tasks typically associated with human intelligence, including natural language processing, problem solving, and pattern recognition.
CyberWire Glossary link: https://thecyberwire.com/glossary/ai
Audio reference link: Staff, 2016. Alan Turing - The Imitation Game - Can Machines Think? [YouTube Video]. Learn Understand Create. URL www.youtube.com/watch?v=Vs7Lo5MKIws.
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more
Word Notes
2M ago
A technique used to create virtual networks within a shared physical network infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/network-slicing
Audio reference link: Whitehead, D.N., 2021. 5G Smart Networks Part 1: Network Slicing [Video]. YouTube. URL www.youtube.com/watch?v=dCt3rYODZ7g.
Learn more about your ad choices. Visit megaphone.fm/adchoices ..read more