B Glossary Flashcards
Bell - LaPadula
A security model that focuses on protecting confidentiality
Biometrics
Use of physical characteristics of a user to perform authentication
Bluesnarfing
Obtaining data from a bluetooth device without authentication or authorization
Bluetooth
Wireless protocol used to generally provide access between a peripheral and a host device
BPF
A way to filter packets for the purpose of capturing or displaying
Berkeley Packet Filter
Brute Force
Applying a strategy of attempting every possible input in order to identify the correct one
Example: passwords
Buffer Overflow
Sending more data into an application than it expects with the intention of controlling the flow of execution
BYOD
A policy that allows users to bring in their own devices to use on the corporate network
Bring Your Own Device