Security+ Set B Flashcards
BAS (building automation system)
components and protocols that facilitate the centralized configuration and monitoring of mechanical and electrical systems within offices and data centers.
BIA (business impact analysis)
a systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations.
BPA (business partnership agreement)
agreement by two companies to work together closely, such as the partner agreements that large IT companies set up with resellers and solution providers.
BPDU guard (bridge protocol data unit guard)
switch port security feature that disables the port if it receives BPDU notifications related to spanning tree. This is configured on access ports where there any BPDU frames are likely to be malicious.
BYOD
security framework and tools to facilitate use of personally-owned devices to access corporate networks and data.
baseband radio
the chip and firmware in a smartphone that acts as a cellular modem.
baseline configuration
a collection of security and configuration settings that are to be applied to a particular system or network in the organization.
bash (bourne again shell)
a command shell and scripting language for Unix-like systems. bastion host A server typically found in a DMZ that is configured to provide a single service to reduce the possibility of compromise.
behavioral analysis
a network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences. Also known as behavior-based detection.
birthday attack
a type of password attack that exploits weaknesses in the mathematical algorithms used to encrypt passwords, in order to take advantage of the probability of different password inputs producing the same encrypted output.
block cipher
a type of symmetric encryption that encrypts data one block at a time, often in 64-bit blocks. It is usually more secure, but is also slower, than stream ciphers.
blockchain
a concept in which an expanding list of transactional records listed in a public ledger is secured using cryptography.
blue team
the defensive team in a penetration test or incident response exercise.
bluejacking
sending an unsolicited message or picture message using bluetooth connection
bluesnarfing
wireless attack where an attacker gains access to unauthorized information on a device using a bluetooth connection.