Word Notes

De: N2K Networks
  • Resumen

  • A fun and informative cybersecurity audio glossary from N2K.
    © 2024 N2K Networks, Inc. 706761
    Más Menos
Episodios
  • OWASP broken access control (noun)
    May 6 2025
    Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
  • OWASP security misconfiguration (noun)
    Apr 29 2025
    Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠⁠ Audio reference link: ⁠⁠“What Is the Elvish Word for Friend?”⁠⁠ Quora, 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    7 m
  • OWASP insecure design (noun)
    Apr 22 2025
    Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 November 2015. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
adbl_web_global_use_to_activate_webcro805_stickypopup

Lo que los oyentes dicen sobre Word Notes

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.