{"id":456,"date":"2025-04-25T14:42:31","date_gmt":"2025-04-25T19:42:31","guid":{"rendered":"https:\/\/julialipscomb.com\/?p=456"},"modified":"2025-04-25T15:30:02","modified_gmt":"2025-04-25T20:30:02","slug":"word-poem-e%c2%b7nu%c2%b7mer%c2%b7a%c2%b7tion","status":"publish","type":"post","link":"https:\/\/julialipscomb.com\/?p=456","title":{"rendered":"word poem: e\u00b7nu\u00b7mer\u00b7a\u00b7tion"},"content":{"rendered":"\n<p>e\u00b7nu\u00b7mer\u00b7a\u00b7tion | \u0259\u02ccno\u035eom\u0259\u02c8r\u0101SH(\u0259)n | noun<\/p>\n\n\n\n<p>1<\/p>\n\n\n\n<p>: the action of mentioning a number of things one by one : also, the action of establishing the number of something (Oxford)<\/p>\n\n\n\n<p>: the act or process of making or stating a list of things one after another : also, the list itself (Merriam-Webster)<\/p>\n\n\n\n<p>: a neat way to assign names to numbers (r\/csharp, <a href=\"https:\/\/www.reddit.com\/r\/csharp\/s\/u29oEhL4KJ\" data-type=\"link\" data-id=\"https:\/\/www.reddit.com\/r\/csharp\/s\/u29oEhL4KJ\">Reddit<\/a>)<\/p>\n\n\n\n<p>2<\/p>\n\n\n\n<p>: ethical hacking : a method of extracting a system\u2019s valid usernames, machine names, share names, directory names, and other information (<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/enumeration-ethical-hacking\/\" data-type=\"link\" data-id=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/enumeration-ethical-hacking\/\">EC Council Cybersecurity Exchange<\/a>)<\/p>\n\n\n\n<p>: list of all entities of a certain kind, in a flat view (Microsoft)<\/p>\n\n\n\n<p>: process of actively gathering detailed information about a target system or network, including usernames, passwords, open ports, services, and network infrastructure (Google AI)<\/p>\n\n\n\n<p>: process used by both security professionals and attackers alike to establish a collective knowledge of the target and its assets to find the weak points that exist based on the information gathered. (<a href=\"https:\/\/www.covertswarm.com\/post\/enumeration-in-cyber-security\" data-type=\"link\" data-id=\"https:\/\/www.covertswarm.com\/post\/enumeration-in-cyber-security\">CovertSwarm<\/a>)<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">Historical Context<\/span><\/p>\n\n\n\n<p>Did you know that the first known use of the word, &#8220;enumeration,&#8221; dates back to 1551? Thank you, Merriam-Webster, for the fun fact!<\/p>\n\n\n\n<p>Since then, it\u2019s been used to describe a fictional event that takes place much, much earlier with remarkable accuracy. In a translation of Homer\u2019s <em>Iliad<\/em> by William Cullen Bryan and published by the hard work and dedication of volunteers for <a href=\"https:\/\/standardebooks.org\" data-type=\"link\" data-id=\"https:\/\/standardebooks.org\">Standard Ebooks<\/a>, the word \u201cenumeration\u201d appears in an editorial summary to accurately describe a defense strategy that appears in the epic poem:<\/p>\n\n\n\n<p>\u201cCatalogue of the troops and ships \u2014 Enumeration of the Trojan forces.\u201d<\/p>\n\n\n\n<p>Both lists are essentially catalogues but they describe opposite ends of the offense-defense spectrum. (One could argue &#8220;Who is the enemy?&#8221; in the <em>Iliad<\/em>, but that&#8217;s a discussion for another post). In this context, <span style=\"font-size: revert;\">\u201cCatalogue\u201d is used to describe a list of allied ships and \u201cenumeration\u201d is used to describe a list of enemies.<\/span> The enemies are the Trojans &#8211; or are they? <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">Modern Context<\/span><\/p>\n\n\n\n<p>In our modern day world, malicious attackers use enumeration to extract data in their exploits. When used ethically, enumeration can be used in reverse as a cyber defense strategy to protect yourself from data leaks and scammers.<\/p>\n\n\n\n<p>Do you want to know how to protect yourself? <a href=\"https:\/\/www.linkedin.com\/in\/julialipscomb\/\" data-type=\"link\" data-id=\"https:\/\/www.linkedin.com\/in\/julialipscomb\/\">Let&#8217;s connect on LinkedIn!<\/a> In my latest post, I share tips on how you can better protect yourself from fraudulent job listings.<\/p>\n\n\n\n<p>Don&#8217;t forget to update your software to protect against any &#8220;Trojan horse&#8221; viruses! See what I did there? \u263a\ufe0f<\/p>\n","protected":false},"excerpt":{"rendered":"<p>e\u00b7nu\u00b7mer\u00b7a\u00b7tion | \u0259\u02ccno\u035eom\u0259\u02c8r\u0101SH(\u0259)n | noun 1 : the action of mentioning a number of things one by one : also, the action of establishing the number of something (Oxford) : the act or process of making or stating a list of things one after another : also, the list itself (Merriam-Webster) : a neat way [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-456","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/julialipscomb.com\/index.php?rest_route=\/wp\/v2\/posts\/456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/julialipscomb.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/julialipscomb.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/julialipscomb.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/julialipscomb.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=456"}],"version-history":[{"count":2,"href":"https:\/\/julialipscomb.com\/index.php?rest_route=\/wp\/v2\/posts\/456\/revisions"}],"predecessor-version":[{"id":458,"href":"https:\/\/julialipscomb.com\/index.php?rest_route=\/wp\/v2\/posts\/456\/revisions\/458"}],"wp:attachment":[{"href":"https:\/\/julialipscomb.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/julialipscomb.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/julialipscomb.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}