Glossary B
- Backdoor
- Backup
- Banner Grabbing
- Bare Metal Virtualization
- Baseline
- Baseline Configuration
- Baselining
- Bastion Host
- BIOS
- Biometric
- Biometrics
- Black Box Testing
- Blacklist
- Blacklisting
- Block Cipher
- Block Cipher Algorithm
- Block Cipher-based Message ...
- Blue Team
- Boundary Protection
- Boundary Protection Device
- Broadcast
- Bluetooth
- Brute Force Password ...
- Buffer Overflow
- Buffer Overflow Attack
- BCP
- Business Impact Analysis
- Byte
- Byte String

Banner Grabbing
The process of capturing banner information—such as application type and version— that is transmitted by a remote port when a connection is initiated. See NIST SP 800-115 for ...
Bare Metal Virtualization
A form of full virtualization where the hypervisor runs directly on the underlying hardware, without a host operating system. See NIST SP 800-125 under Bare metal virtualization for more information.
Baseline Configuration
A documented set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on at ...
Baselining
Monitoring resources to determine typical utilization patterns so that significant deviations can be detected. See NIST SP 800-61 Rev. 2 for more information.
Bastion Host
A special purposecomputer on a network where the computer is specifically designed and configuredto withstand attacks.See CNSSI 4009-2015 for more information.
Biometrics
A measurable physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an applicant. Facial images, fingerprints, and ...
Black Box Testing
A method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can ...
Blacklisting
The process used to identify: (i) software programs that are not authorized to execute on an information system; or (ii) prohibited Universal Resource Locators (URL)/websites.See ...
Block Cipher
A symmetric-key cryptographic algorithm that transforms one block of information at a time using a cryptographic key. For a block cipher algorithm, the length of the input block is the same ...
Block Cipher Algorithm
A family of functions and their inverses that is parameterized by cryptographic keys; the functions map bit strings of a fixed length to bit strings ...
Block Cipher-based Message Authentication Code
Cipher-based Message Authentication Code (as specified in NIST SP 800-38B). See the following under CMAC for information: NIST SP 800-108. NIST SP 800-185. NIST SP 800-56C.
Boundary Protection
Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use ...
Boundary Protection Device
A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of ...
Brute Force Password Attack
A method of accessing an obstructed device through attempting multiple combinations of numeric/alphanumeric passwords. See NIST SP 800-72 and NIST SP 800-101 Rev. 1 for more information.
Buffer Overflow
A condition at an interface under which more input can be placedinto a buffer or data holding area than the capacity allocated, overwritingother information. Adversaries ...
Buffer Overflow Attack
A method of overloading a predefined amount of space in a buffer, which can potentially overwrite and corrupt memory in data. See NIST SP 800-72 for more information. A ...
Business Impact Analysis
An analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption. See CNSSI ...