The Security Guide Security Guide RSS Feed


Internet and Data Security Knowledgebase

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 


BS 7799 An information security standard published by the British Standards Institute (BSI).
BS 7799 is the original British Standard from which ISO/IEC 17799 and then ISO/IEC 27002 was derived.
Back door A loophole in a computer's security systems that allows a hacker access to it.
Backscatter A spammer often uses a faked sender address. If this address belongs to a valid user then this user ends up receiving the non-delivery reports.
Since the emails sent out by the spammer tend to be in large numbers, thousands of NDRs may end up in the victim's mailbox. The resulting emails are known as NDR spam or backscatter.
Basic authentication The way most web sites work today to identify someone is with basic authentication. The protected resource is guarded by the web site which displays a prompt for the user to specify a name and a password.
There are many flaws in this model. Someone may guess it or if someone is watching over your shoulder as you type, they will know your password and be able to impersonate you.
If you are using an insecure connection, someone may be listening on the line. If a trogan or virus got on your system, a key logger may be transmitting the information to a third party.
Biometric Using body measurements, such as fingerprints, irises, as a means of authentication.
Black hat A hacker who uses their skills to break into computer systems.
Bluetooth An industry standard for short-range wireless connections between devices like mobile phones, headsets, computers and PDAs.
Boot-time security The firewall starts before network connections are allowed.
In earlier versions of Windows, there was a period of time between when the network stack finished loading and when Internet Connection Firewall started to provide protection on the network.
With boot-time security, only such basic networking functions as Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and communication with a domain controller are allowed.
Botnet A collection of PCs which have been infected by a virus and which are under the central control of criminals or hackers.
Boundary Encryption Data contained in emails can be intercepted and then read, deleted or altered before it reaches the intended destination.
Boundary Encryption can automatically encrypt emails according to a specified policy.
Buffer overflow In computer security and programming, a buffer overflow, or buffer overrun, is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed-length buffer.
Buffer overrun A condition that results from adding more information to a buffer than it was designed to hold. An attacker may exploit this vulnerability to take over a system.

© RuleWorks - All Rights Reserved - Policy -