Glossary- B Flashcards
back door
A section of code that permits someone to bypass access controls and ac- cess data or functions. Back doors are commonly placed in programs during develop- ment but are removed before programming is complete.
background check
The process of verifying an employment candidate’s employment history, education records, professional licenses and certifications, criminal back- ground, and financial background.
background verification
See background check.
back-out plan
A procedure used to reverse the effect of a change that was not successful.
backup
The process of copying important data to another media device in the event of a hardware failure, error, or software bug that causes damage to data.
backup media rotation
Any scheme used to determine how backup media is to be reused.
balanced scorecard
A management tool that is used to measure the performance and effectiveness of an organization.
barbed wire
Coiled or straight wire with sharp barbs that may be placed along the top of a fence or wall to prevent or deter passage by unauthorized personnel.
benchmark
The practice of measuring a process in order to compare its performance and quality with the same process as performed by another firm. The purpose is to discover opportunities for improvement that may result in lower cost, fewer resources, and higher quality.
biometrics
Any use of a machine-readable characteristic of a user’s body that unique- ly identifies the user. Biometrics can be used for strong authentication. Types of bio- metrics include voice recognition, fingerprint, hand scan, palm vein scan, iris scan, retina scan, facial scan, and handwriting. See also authentication, strong authentication.
blackmail
An attempt to extort money from an individual or organization through a threat of exposure.
blackout
A complete loss of electric power for more than a few seconds.
blade server
A type of computer architecture where a main chassis equipped with a power supply, cooling, network, and console connectors contains several slots that are fitted with individual computer modules called blades. Each blade is an independent computer system.
block cipher
This is an encryption algorithm that operates on blocks of data.
Bluetooth
A short-range airlink standard for data communications between periph- erals and low-power consumption devices.