B
Backdoor: A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.
Baiting: A social engineering tactic that tempts people into compromising their
Bandwidth: Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time. Usually expressed in bits per second.
Banner: A banner is the information that is displayed to a remote user trying to connect to a service. This may include version information, system information, or a warning about authorized use.
Baseline Configuration (baseline image): A documented set of specifications within a system that is used as a basis for future builds, releases, and updates.
Bash: The default shell in most Linux distributions.
Basic Auth: The technology used to establish a user’s request to access a server.
Basic Input/Output System (BIOS): A microchip that contains loading instructions for the computer and is prevalent in older systems.
Biometrics: The unique physical characteristics that can be used to verify a person’s identity
Bit: The smallest unit of data measurement on a computer.
Blocklist: A list of entities that are blocked or denied privileges or access.
Blue Team: A group that defends an enterprise’s information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team).
Boolean Data: Data that can only be one of two values: either True or False
Bootloader: A software program that boots the operating system
Bot: A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
Botnet: A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder.”
Bracket Notation: The indices placed in square brackets.
Broken Chain of Custody: Inconsistencies in the collection and logging of evidence in browser loads.
Browser: A client computer program that can retrieve and display information from servers on the World Wide Web.
Brute Force: A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
Brute Force Attack: The trial and error process of discovering private information.
Buffer Overflow: A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information – which has to go somewhere – can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.
Bug: An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
Bug Bounty: Programs that encourage freelance hackers to find and report
Built-in function: A function that exists within Python and can be called directly bundled in with legitimate programs which might display ads, cause device slowdown,
Business Continuity Plan (BCP): A document that outlines the procedures to sustain
Business Continuity: An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans
Business Email Compromise (BEC): A type of phishing attack where a threat actor business operations during and after a significant disruption by establishing risk disaster recovery plans.
Byte: A fundamental unit of computer storage; the smallest addressable unit in a computer’s architecture. Usually holds one character of information and usually means eight bits.
« Back to Glossary Index