B Flashcards
Back door
An undocumented way of gaining access to a computer system. After a system is compromised, an attacker may load a program that listens on a port (back door) so that the attacker can enter the system at any time. A back door is also referred to as a trapdoor.
Back up
Copy and move data to a medium so that it may be restored if the original data is corrupted or destroyed. A full backup copies all the data from the system to the backup medium. An incremental backup copies only the files that have been modified since the previous backup. A differential backup backs up all files since the last full backup.
Baseline
The minimum level of security necessary to support and enforce a security policy.
Bell-LaPadula model
The model uses a formal state transition model that describes its access controls and how they should perform. When the system must transition from one state to another, the security of the system should never be lowered or compromised. (See also multilevel security, simple security property, and star property (*-property).
Biba model
A formal state transition system of computer security policy that describes a set of access control roles designed to ensure data integrity.
Biometrics
When used within computer security, identifies individuals by physiological characteristics, such as a fingerprint, hand geometry, or pattern in the iris.
Blacklist
A set of known bad resources such as IP addresses, domain names, or application.
Browsing
Searching through storage media looking for specific information without necessarily knowing what format the information is in. A browsing attack is one in which the attacker looks around a computer system either to see what looks interesting or to find specific information.
Brute-force attack
An attack that continually tries different inputs to achieve a predefined goal, which can be used to obtain credentials for unauthorized access.
Business impact analysis (BIA)
A functional analysis in which a team collects data, documents business functions, develops a hierarchy of business functions, and applies a classification scheme to indicate each individual function’s criticality level.