B(s) Flashcards

1
Q

Backdoor

A

A shortcut in a system that allows a user to bypass security checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Background checks

A

Verification of a person’s background and experience, also called a pre-employment screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backward chaining

A

Expert system mode that starts with begins with a premise, and works backwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baseband

A

Network with one channel; can only send one signal at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baseline

A

Uniform ways to implement a safeguard,administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Baselining

A

The process of capturing a point in time understanding of the current system security configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BIOS

A

Basic Input Output System, typically stored in firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BRI

A

Basic Rate Interface, provides two 64 K digital ISDN channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bastion host

A

Any host placed on the internet that is not protected by another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bayesian filtering

A

Uses mathematical formulas to assign probabilities to make decisions such as identifying spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BCI

A

The business continuity Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BCP

A

Business Continuity Plan. A long-term plan to ensure the continuity of business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BCP/DRP project manager

A

The key point of contact for ensuring that a BCP/DRP is not only completed, but also routinely tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bell-LaPadula

A

Security model focused on maintaining the confidentiality of objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Best evidence rule

A

Requires use of the strongest possible evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Best practice

A

A consensus of the best way to protect the confidentiality, integrity and availability of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BGP

A

Border Gateway Protocol, the routing protocol used on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Biba

A

Security model focused on maintaining the integrity of of objects

19
Q

Big Bang testing

A

Integration testing that tests all integrated software components

20
Q

Binary image

A

Bit-level copy of memory

21
Q

Black box software testing

A

Gives the tester no internal details: the software is treated as a black box that receives inputs

22
Q

Black hat

A

Unethical hacker or researcher

23
Q

Blowfish

A

Block cipher using from 32 through 448 bit (the default is 128) keys to encrypt 64 bit of data

24
Q

Bluetooth

A

802.15 networking, a PAN wireless technology

25
Bollard
A post designed to stop a car, typically deployed in front of building entrances
26
Book cipher
Cryptographic method that uses whole words from a well-known text such as a dictionary as a one-to-one replacement for plaintext
27
Boot sector virus
Virus that infects the boot sector of a PC, which ensures the virus loads upon system startup
28
BOOTP
Bootstrap protocol, used for bootstrapping via a network by diskless systems
29
Bot
A computer system running malware that is controlled via a botnet
30
Botnet
A central bot command and control (C&C) Network, managed by humans called bot herders
31
Bottom-Up programming
Starts with the low-level technical implementation details and works up to the concept of the complete program
32
Breach notification
Notification of persons whose personal data has been, or is like to have been compromised
33
Brewer-Nash
Or (Chinese wall model) model designed to avoid conflicts of interest by prohibiting one person, like a consultant, from accessing multiple conflict of interest categories (CoIs)
34
Bridge
Layer 2 device that has two ports and connects network segments together
35
Broadband
Network with multiple channels; can send multiple signals at a time, like cable TV
36
Broadcast
Traffic that is sent to all stations in a LAN
37
BRP
Business Recovery Plan, details the steps required to restore normal business operations after a recovering from a disruptive event. Also known as the Business Resumption Plan
38
Brute force attack
Attack that attempts every possible key or combination
39
BS-25999
Continuity standard by the British Standards Institute (BSI)
40
Buffer overflow
Condition where an attacker can insert data beyond the end of a buffer variable
41
Bus
Physical network topology that connects network nodes in a string
42
Business interruption testing
Partial or complete failover to an alternate site
43
Business Owners
Also called Mission Owners, members of senior management who create the information security program and ensure that is properly staffed, funded, and has organizational priority
44
Bytecode
Machine-independent code, used by Java