Glossary- B Flashcards

1
Q

back door

A

A section of code that permits someone to bypass access controls and ac- cess data or functions. Back doors are commonly placed in programs during develop- ment but are removed before programming is complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

background check

A

The process of verifying an employment candidate’s employment history, education records, professional licenses and certifications, criminal back- ground, and financial background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

background verification

A

See background check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

back-out plan

A

A procedure used to reverse the effect of a change that was not successful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

backup

A

The process of copying important data to another media device in the event of a hardware failure, error, or software bug that causes damage to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

backup media rotation

A

Any scheme used to determine how backup media is to be reused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

balanced scorecard

A

A management tool that is used to measure the performance and effectiveness of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

barbed wire

A

Coiled or straight wire with sharp barbs that may be placed along the top of a fence or wall to prevent or deter passage by unauthorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

benchmark

A

The practice of measuring a process in order to compare its performance and quality with the same process as performed by another firm. The purpose is to discover opportunities for improvement that may result in lower cost, fewer resources, and higher quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

biometrics

A

Any use of a machine-readable characteristic of a user’s body that unique- ly identifies the user. Biometrics can be used for strong authentication. Types of bio- metrics include voice recognition, fingerprint, hand scan, palm vein scan, iris scan, retina scan, facial scan, and handwriting. See also authentication, strong authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

blackmail

A

An attempt to extort money from an individual or organization through a threat of exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

blackout

A

A complete loss of electric power for more than a few seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

blade server

A

A type of computer architecture where a main chassis equipped with a power supply, cooling, network, and console connectors contains several slots that are fitted with individual computer modules called blades. Each blade is an independent computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

block cipher

A

This is an encryption algorithm that operates on blocks of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bluetooth

A

A short-range airlink standard for data communications between periph- erals and low-power consumption devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

bollard

A

A barrier that prevents the entry of vehicles into protected areas.

17
Q

border gateway protocol (BGP)

A

A TCP/IP routing protocol that is used to transmit network routing information from one network router to another in order to determine the most efficient path through a large network.

18
Q

bot

A

A type of malware in which agents are implanted by other forms of malware and which are programmed to obey remotely issued instructions. See also bot army.

19
Q

bot army

A

A collection of bots that are under the control of an individual. See also bot.

20
Q

bridge

A

An Ethernet network device that is used to interconnect two or more Ethernet
networks.

21
Q

broadcast address

A

The highest numeric IP address in an IP subnet. When a packet is sent to the network’s broadcast address, all active stations on the network will receive it.

22
Q

brownout

A

A sustained drop in voltage that can last from several seconds to several hours.

23
Q

budget

A

A plan for allocating resources over a certain time period.

24
Q

bug sweeping

A

The practice of electronically searching for covert listening devices.

25
Q

bus

A

A component in a computer that provides the means for the different compo- nents of the computer to communicate with each other.

26
Q

bus topology

A

A network topology where each station is connected to a central cable.

27
Q

business case

A

An explanation of the expected benefits to the business that will be
realized as a result of a program or project.

28
Q

business continuity planning (BCP)

A

The activities required to ensure the continua- tion of critical business processes.

29
Q

business functional requirements

A

Formal statements that describe required busi- ness functions that a system must support.

30
Q

business impact analysis (BIA)

A

A study that is used to identify the impact that differ- ent disaster scenarios will have on on-going business operations.

31
Q

business realization

A

The result of strategic planning, process development, and sys- tems development, which all contribute toward a launch of business operations to reach a set of business objectives.

32
Q

business process reengineering

A

The set of activities related to the process of making changes to business processes.

33
Q

business recovery plan

A

The activities required to recover and resume critical business processes and activities. See also response document.