Glossary of Terms Page 4 Flashcards
Basic Input/Output System (BIOS)
A firmware element of a computer system that provides the interface between hardware system and software with respect to devices and peripherals. BIOS is a being replaced by Unified Extensible Firmware Interface (UEFI), a more complex and capable system.
birthday attack
An attack methodology based on combinations rather than linear probability. In a room of thirty people, one doesn’t have to match a specific birthday, rather match any two birthdays in the room match, making the problem combinatorial match, which is much more likely…. ????
Blowfish
A free implementation of a symmetric block cipher developed by Bruce Schneier as a drop-in replacement for DES and IDEA. It has a variable-bit-length scheme from 32 to 448 bits, resulting in varying levels of security.
bluebugging
The use of a Bluetooth-enabled device to eavesdrop on another person’s conversation using that person’s Bluetooth phone as a transmitter. The bluebug application silently causes a Bluetooth device to make a phone call to another device, causing the phone to act as a transmitter and allowing the listener to eavesdrop on the victims conversation in real life.
bluejacking
The sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, tablets, or laptop computers.
bluesnarfing
The unauthorized access of information from a Bluetooth-enabled device through a Bluetooth connection, often between mobile phones, desktops, laptops, and tablets.
Border Gateway Protocol (BGP)
The interdomain routing protocol implemented in Internet Protocol (IP) networks to enable routing between autonomous systems.
botnet
A collection of software robots, or “bots” that run autonomously and automatically and commonly, invisibly in the background. The term is most often associated with malicious software, but in can also refer to the network of computers using distributed computing software.
bridge protocol data unit (BPDU)
BPDUs are a type of data message that are exchanged across the switches within a nextneded LAN that uses a Spanning Tree Protocol (STP) topology.