Cybersecurity Terminology

ResourcesTerms & Definitions

Backdoor
- A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application
BCrypt
- password-hashing function based on the Blowfish cipher and presented at USENIX in 1999
behavior
- the extent to which an individual practices several types of cybersecurity measures to avoid or attenuate the types of cyber threats that they are vulnerable to
blackbox
- a form of testing that is performed with no knowledge of a target system's internals
blocklist
- A list of entities that are blocked or denied privileges or access.
blue Team
- A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team).
bluejacking
- an attack in which someone sends unsolicited messages to a Bluetooth-enabled device
bluesnarfing
- a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection
bot
- A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
bot master
- The controller of a botnet that, from a remote location, provides direction to the compromised computers in the botnet.
botnet
- A collection of computers compromised by malicious code and controlled across a network.
bruteforce
- an attack is a method that uses trial and error to crack passwords, login credentials, and encryption keys
bug
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
build security in
- A set of principles, practices, and tools to design, develop, and evolve information systems and software that enhance resistance to vulnerabilities, flaws, and attacks.
microsoft-logo
ibm-logo
dell-logo
hp-logo
sentinel-logo
vmware-logo
Skip to content