Day 2 Reversed Flashcards
BIOS
Basic Input/Output System
Firmware based initialization code for booting a system.
The now deprecated initial program sets for computer.
Bluetooth
802.15
Technology commonly used to communicate with small devices at modest speeds over a short range with low security requirements.
BCP
Business Continuity Plan
The orderly planning for and management of threats and incidents to an organization.
BGP
Border Gateway Protocol
Routing protocol for routing exterior traffic between autonomous systems/organizations.
BO
Buffer Overflow
The insertion of malicious computer instructions into the RAM of a host to accomplish denial of service or injecting shellcode.
BPA
Business Partners Agreement
This outlines the goals and responsibilities between entities pursuing a common work product.
BPDU
Bridge Protocol Data Unit
This protocol is used to identify efficient paths and loops in a switched network.
BSSID
Basic Service Set IDentifier
This is the MAC address that a wireless device is attached to.
Brute Force
Brute Force Attack
Discovers a hash or encrypted secret by attempting all combinations and permutations.
BYOD
Bring Your Own Device
The organization compensates the individual for use of their phone in organizational activities.
C2
Command and Control
Servers that are centrally placed the hold control instructions for illicitly managed hosts.
CA
Certificate Authority
This entity issues certificates. After verifying them, and is the center of trust in PKI.
CAC
Common Access Card
A form of identification with photograph, barcode, RFID and cryptographic storage of private key information.
CAPTCHA
Completely Automated Public Turing to Tell Computers and Humans Apart
This is intended to prevent rogue automated attempts at access.
CAR
Corrective Action Report
A document generated when the defect or error has been detected that has the goal of eliminating a reoccurrence.