Backdoor
- A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software applicationBCrypt
- password-hashing function based on the Blowfish cipher and presented at USENIX in 1999behavior
- the extent to which an individual practices several types of cybersecurity measures to avoid or attenuate the types of cyber threats that they are vulnerable toblackbox
- a form of testing that is performed with no knowledge of a target system's internalsblocklist
- A list of entities that are blocked or denied privileges or access.blue Team
- A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team).bluejacking
- an attack in which someone sends unsolicited messages to a Bluetooth-enabled devicebluesnarfing
- a hacking technique in which a hacker accesses a wireless device through a Bluetooth connectionbot
- A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.bot master
- The controller of a botnet that, from a remote location, provides direction to the compromised computers in the botnet.botnet
- A collection of computers compromised by malicious code and controlled across a network.bruteforce
- an attack is a method that uses trial and error to crack passwords, login credentials, and encryption keysbug
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.build security in
- A set of principles, practices, and tools to design, develop, and evolve information systems and software that enhance resistance to vulnerabilities, flaws, and attacks.