B

« Back to Glossary Index

Backdoor: A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.

Baiting: A social engineering tactic that tempts people into compromising their

Bandwidth: Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time. Usually expressed in bits per second.

Banner: A banner is the information that is displayed to a remote user trying to connect to a service. This may include version information, system information, or a warning about authorized use.

Baseline Configuration (baseline image): A documented set of specifications within a system that is used as a basis for future builds, releases, and updates.

Bash: The default shell in most Linux distributions.

Basic Auth: The technology used to establish a user’s request to access a server.

Basic Input/Output System (BIOS): A microchip that contains loading instructions for the computer and is prevalent in older systems.

Biometrics: The unique physical characteristics that can be used to verify a person’s identity

Bit: The smallest unit of data measurement on a computer.

Blocklist: A list of entities that are blocked or denied privileges or access.

Blue Team: A group that defends an enterprise’s information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team).

Boolean Data: Data that can only be one of two values: either True or False

Bootloader: A software program that boots the operating system

Bot: A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.

Botnet: A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder.”

Bracket Notation: The indices placed in square brackets.

Broken Chain of Custody: Inconsistencies in the collection and logging of evidence in browser loads.

Browser: A client computer program that can retrieve and display information from servers on the World Wide Web.

Brute Force: A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.

Brute Force Attack: The trial and error process of discovering private information.

Buffer Overflow: A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information – which has to go somewhere – can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.

Bug: An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.

Bug Bounty: Programs that encourage freelance hackers to find and report

Built-in function: A function that exists within Python and can be called directly bundled in with legitimate programs which might display ads, cause device slowdown,

Business Continuity Plan (BCP): A document that outlines the procedures to sustain

Business Continuity: An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

Business Email Compromise (BEC): A type of phishing attack where a threat actor business operations during and after a significant disruption by establishing risk disaster recovery plans.

Byte: A fundamental unit of computer storage; the smallest addressable unit in a computer’s architecture. Usually holds one character of information and usually means eight bits.

SEARCH GLOSSARY
« Back to Glossary Index

Shopping Cart0

Cart