Glossary- B Flashcards
back door
A section of code that permits someone to bypass access controls and ac- cess data or functions. Back doors are commonly placed in programs during develop- ment but are removed before programming is complete.
background check
The process of verifying an employment candidate’s employment history, education records, professional licenses and certifications, criminal back- ground, and financial background.
background verification
See background check.
back-out plan
A procedure used to reverse the effect of a change that was not successful.
backup
The process of copying important data to another media device in the event of a hardware failure, error, or software bug that causes damage to data.
backup media rotation
Any scheme used to determine how backup media is to be reused.
balanced scorecard
A management tool that is used to measure the performance and effectiveness of an organization.
barbed wire
Coiled or straight wire with sharp barbs that may be placed along the top of a fence or wall to prevent or deter passage by unauthorized personnel.
benchmark
The practice of measuring a process in order to compare its performance and quality with the same process as performed by another firm. The purpose is to discover opportunities for improvement that may result in lower cost, fewer resources, and higher quality.
biometrics
Any use of a machine-readable characteristic of a user’s body that unique- ly identifies the user. Biometrics can be used for strong authentication. Types of bio- metrics include voice recognition, fingerprint, hand scan, palm vein scan, iris scan, retina scan, facial scan, and handwriting. See also authentication, strong authentication.
blackmail
An attempt to extort money from an individual or organization through a threat of exposure.
blackout
A complete loss of electric power for more than a few seconds.
blade server
A type of computer architecture where a main chassis equipped with a power supply, cooling, network, and console connectors contains several slots that are fitted with individual computer modules called blades. Each blade is an independent computer system.
block cipher
This is an encryption algorithm that operates on blocks of data.
Bluetooth
A short-range airlink standard for data communications between periph- erals and low-power consumption devices.
bollard
A barrier that prevents the entry of vehicles into protected areas.
border gateway protocol (BGP)
A TCP/IP routing protocol that is used to transmit network routing information from one network router to another in order to determine the most efficient path through a large network.
bot
A type of malware in which agents are implanted by other forms of malware and which are programmed to obey remotely issued instructions. See also bot army.
bot army
A collection of bots that are under the control of an individual. See also bot.
bridge
An Ethernet network device that is used to interconnect two or more Ethernet
networks.
broadcast address
The highest numeric IP address in an IP subnet. When a packet is sent to the network’s broadcast address, all active stations on the network will receive it.
brownout
A sustained drop in voltage that can last from several seconds to several hours.
budget
A plan for allocating resources over a certain time period.
bug sweeping
The practice of electronically searching for covert listening devices.