Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
b
b ≡ a mod n
B2B
BAC
Back Channel
Backdoor
Backhaul
Backscatter Channel
Backtracking Resistance
Backup
Backup (key and/or metadata)
Backup (system)
Backup Facility
Banner
Banner Grabbing
Bare Metal Virtualization
Base Station
Base Station Controller
Base Transceiver Station
Baseline
Baseline Configuration
Baseline Criticality
Baseline Security
Baseline Security Requirement
Baseline Security Requirements
Baselining
Basic Encode Rules
Basic Encoding Rules
Basic Encoding Rules Tag-Length-Value
Basic Input/Output System
Basic Rate
Basic Service Set
Basic Service Set Identifier
Basic Testing
Basis Vector
Bastion Host
Batch Process
BCA
BCD
BCP
BCWP
BCWS
BD
BDB
BDS
Beacon
Bearer Assertion
Behavior Analysis
Behavior Blockers
Behavioral Outcome
Bend
Benign Environment
BER
Bernoulli Random Variable
BER-TLV
BER-TLV Data Object
Best Current Practice
Better Than Nothing Security
BGP
BGP Peer
BGP Session
BGP Speaker
BGP-4
BIA
Biased
Bi-Directional
Binary Coded Decimal
Binary Sequence
Binding
Binding Cache (on HA or CN)
Binding Update
Binding Update Acknowledgement
Binding Update List (on MN)
Binomial Distribution
Biometric
Biometric Data Block
Biometric Information
Biometric Information Template
Biometric Service Provider
Biometrics
BIOS
BIS
Bit
Bit Error
Bit Error Rate
Bit Length
Bit Stream Image
Bit Stream Imaging
Bit String
BITS
Bits Of Security
Bitstring
Bitwise Exclusive-Or
BLACK
Black Box Testing
Black Core
BLACK data
Blacklist
Blacklisting
BLE
Blended Attack
Blinding
Block
Block Cipher
Block Cipher Algorithm
Block Cipher Key
Block Cipher Mode Of Operation
Block Size
BLSR
Blue Team
Bluetooth
Bluetooth Low Energy
Blu-Ray Disc
Body
Body Of Evidence
BoE
Boot Device Selection
Border Gateway Protocol
Border Gateway Protocol 4
Boundary
Boundary Protection
Boundary Protection Device
BPML
BPSS
BR
Bring Your Own Device
BRM
Broad Network Access
Broadcast
Brokered Trust
Browsing
Brute Force Password Attack
BS
BS2I
BSC
BSP
BSS
BSSID
BTNS
BTS
BU
BUA
Budget Cost Of Work Performed
Budget Year
Budgeted Cost Of Work Scheduled
Buffer Overflow
Buffer Overflow Attack
Bulk Encryption
Bump In The API
Bump In The Stack
Business Areas
Business Associate
Business Associate Contract
Business Case Analysis
Business Continuity Plan
Business Impact Analysis
Business Impact Assessment
Business Process Markup Language
Business Process Specification Schema
Business Reference Model
Business-To-Business
BY
BYOD
Byte
Byte String
Byte String To Integer
Bytelen