top of page


AI Terminology Cheat Sheet
AI conversations are full of jargon. If you’ve ever read an article about AI and felt lost by the third paragraph, this post is for you. Here’s a plain-language glossary of the terms you’ll encounter most. Bookmark it and come back whenever you need a refresher. The basics Artificial Intelligence (AI) — Any system that performs tasks normally requiring human intelligence. This is the broadest term and covers everything from a simple spam filter to ChatGPT. Machine Learning (M
Nas Belfon
Mar 145 min read


How Attackers Are Using AI
AI isn’t just a tool for businesses and developers. Attackers are using it too, and it’s making certain types of attacks cheaper, faster, and more effective. This isn’t theoretical; these techniques are being used in real attacks today. AI-generated phishing emails For years, one of the easiest ways to spot a phishing email was bad grammar and awkward phrasing. Non-native English speakers ran many phishing campaigns, and the writing gave them away. That advantage is gone. LL
Nas Belfon
Mar 144 min read


How ChatGPT Actually Works (Simplified)
ChatGPT is probably the most well-known AI product right now. Millions of people use it daily. But most people have no idea what's happening when they type a question and get a response. Let's walk through it without drowning in technical jargon. Understanding the Role of a Large Language Model ChatGPT is built on a type of AI called a large language model (LLM). The word "large" refers to the size of the model — it has billions of parameters (think of parameters as adjustabl
Nas Belfon
Mar 144 min read


What is AI, Really? A No-Jargon Explanation
AI is everywhere in the news right now. Every product is "AI-powered." Every company is "integrating AI." But when you strip away the marketing, what is artificial intelligence actually doing? And how much of what people say about it is accurate? Let's cut through the noise. AI is pattern recognition. At its core, AI is software that learns patterns from data and uses those patterns to make predictions or decisions. That's it. It's not thinking. It's not conscious. It's not p
Nas Belfon
Mar 64 min read


NIST Cybersecurity Framework Explained for Beginners (CSF 2.0)
What it is, how the 6 functions work, and why understanding it could land you your first security job
Nas Belfon
Mar 54 min read


Routers vs. Switches vs. Hubs — What Each One Actually Does
Walk into any office server room, and you'll see a rack full of blinking boxes with cables running everywhere. Some of those boxes are routers, some are switches, and if the office is old enough, maybe a hub or two gathering dust. They all move data, but they do so in very different ways. Understanding the difference between them is something you'll need to have locked down early. Hubs — the dumbest device on the network I'm not being mean. A hub is genuinely unintelligent. I
Nas Belfon
Feb 254 min read


IP Addresses — How Devices Find Each Other
Every device on a network needs an address. Without one, data has no idea where to go. An IP address (Internet Protocol address) is a non-negotiable part of understanding how cybersecurity works. What an IP address actually is An IP address is a number assigned to every device on a network. It's how that device gets identified and located. When your computer requests a webpage, it sends that request from its IP address to the server's IP address. The server sends the page bac
Nas Belfon
Feb 254 min read


Slaying the Beast(CISSP)
Here's my debut video, starring my kitchen as the glamorous backdrop! 😄 I'm cringing just a little bit here. My main mission was to not unleash my awkward self on you while sharing all the tips and tricks that saved my bacon. This exam was a real test of my ability to think like anything but an Engineer. Spoiler alert: I flunked my first try but was on a mission to conquer it. The resources below? Absolute lifesavers! Resources How to think like a manager - Luke Ahmed Desti
Nas Belfon
Apr 24, 20251 min read


Kickstart Your Cyber Security Career in 2025
Starting a career in this field might seem daunting at first. The path might not be clear whether you come from IT, the military, or, like me, have a background in fashion design. Here are some tips to help you along. Let's delve into the details! Assess Your Background and Transferable Skills A technical degree might seem like a must-have for cybersecurity careers, but reality tells a different story. The digital world of 2025 welcomes people from all walks of life, and non-
Nas Belfon
Apr 23, 20256 min read


Deeper dive into OSI Model
Let's embark on a journey through each layer of this model, exploring the devices that bring it to life, the protocols that keep it running, and the security threats that lurk in the shadows. Layer 7: Application Layer At the top of the OSI model sits the Application Layer, the realm where users directly interact with software applications. Devices: Web browsers, email clients, file transfer tools Protocols: HTTP, SMTP, FTP, DNS Security Attacks: SQL injection, cross-site scr
Nas Belfon
Oct 5, 20243 min read


What in the OSI is going on?
The OSI (Open Systems Interconnection) model is a simple way to understand how computer networks work. Think of it as a sort of blueprint for how different parts of a network talk to each other. Created by the International Organization for Standardization (ISO), this model breaks down network communication into seven layers. Imagine the OSI model as a universal translator for computer experts. It helps them ensure that different systems can chat and understand each other, ma
Nas Belfon
Oct 5, 20243 min read


The ABC's...
Welcome to your guide to cybersecurity terminology! Whether you're just starting your journey in the digital security world or looking to brush up on your knowledge, this glossary covers essential terms related to devices, protocols, and security attacks. Let's dive in! A Access Control : The practice of restricting access to resources based on user authentication and authorization. This is crucial for maintaining security within an organization. Example: A company using keyc
Nas Belfon
Oct 5, 20247 min read


Enhancing Network Security: A Comprehensive Guide for Beginners
In today’s digital age, where we are constantly connected to the world through the internet, network security is of utmost importance. With cyber threats on the rise, it is crucial for individuals and businesses to enhance their network security measures to protect sensitive information and data. If you are a beginner looking to bolster your network security, you have come to the right place. First and foremost, it is essential to understand the basics of network security. Ne
Nas Belfon
Oct 5, 20242 min read
bottom of page