Glossary B
Backdoor

Backdoor

An undocumented way of gaining access to computer system. A backdoor is a potential security risk. See CNSSI 4009-2015 (NIST SP 800-82 Rev. 1) and NIST SP ...

Read More

backup

Backup

A copy of files and programs made to facilitate recovery if necessary.See NIST SP 800-34 Rev. 1 under Backup and NISTIR 7621 Rev. 1 under Backup (NIST SP ...

Read More

Telnet

Banner Grabbing

The process of capturing banner information—such as application type and version— that is transmitted by a remote port when a connection is initiated. See NIST SP 800-115 for ...

Read More

Bare Metal Virtualization

Bare Metal Virtualization

A form of full virtualization where the hypervisor runs directly on the underlying hardware, without a host operating system. See NIST SP 800-125 under Bare metal virtualization for more information. 

Read More

Baseline

Baseline

Hardware, software, and relevant documentation for an information system at a given point in time. See CNSSI 4009-2015 for more information. Hardware, software, databases, and relevant documentation for an ...

Read More

Baseline-Configuration

Baseline Configuration

A documented set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on at ...

Read More

Baselining

Baselining

Monitoring resources to determine typical utilization patterns so that significant deviations can be detected.  See NIST SP 800-61 Rev. 2 for more information. 

Read More

Bastion-host

Bastion Host

A special purposecomputer on a network where the computer is specifically designed and configuredto withstand attacks.See CNSSI 4009-2015 for more information.

Read More

Bios

BIOS

In this publication, refers collectively to boot firmware based on the conventional BIOS, Extensible Firmware Interface (EFI), and the Unified Extensible Firmware Interface (UEFI). See NIST SP ...

Read More

Biometric

Biometric

Measurable physical characteristics or personal behavioral traits used to identify, or verify the claimed identity of, an individual. Facial images, fingerprints, and handwriting samples are ...

Read More

Biometrics

Biometrics

A measurable physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an applicant. Facial images, fingerprints, and ...

Read More

Black Box Testing

Black Box Testing

A method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can ...

Read More

Blacklist

Blacklist

A list of discrete entities, such as hosts or applications that have been previously determined to be associated with malicious activity. Also known as dirty ...

Read More

Blacklisting

Blacklisting

The process used to identify: (i) software programs that are not authorized to execute on an information system; or (ii) prohibited Universal Resource Locators (URL)/websites.See ...

Read More

Block Cipher

Block Cipher

A symmetric-key cryptographic algorithm that transforms one block of information at a time using a cryptographic key. For a block cipher algorithm, the length of the input block is the same ...

Read More

Block Cipher Algorithm

Block Cipher Algorithm

A family of functions and their inverses that is parameterized by cryptographic keys; the functions map bit strings of a fixed length to bit strings ...

Read More

Block Cipher-based Message Authentication Code

Block Cipher-based Message Authentication Code

Cipher-based Message Authentication Code (as specified in NIST SP 800-38B). See the following under CMAC for information:  NIST SP 800-108. NIST SP 800-185.  NIST SP 800-56C.   

Read More

Blue Team

Blue Team

 The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers (i.e., the Red ...

Read More

Boundary Protection

Boundary Protection

Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use ...

Read More

Boundary Protection Device

Boundary Protection Device

A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of ...

Read More

Broadcast

Broadcast

Transmission to all devices in a network without any acknowledgment by the receivers. See  NIST SP 800-82 Rev. 2 (IEC/PAS 62410) for more information. 

Read More

Bluetooth

Bluetooth

A wireless protocol that allows two Bluetooth enabled devices to communicate with each other within a short distance (e.g., 30 ft.).See  NIST SP 800-72 for ...

Read More

Brute Force Password Attack

Brute Force Password Attack

A method of accessing an obstructed device through attempting multiple combinations of numeric/alphanumeric passwords. See NIST SP 800-72 and NIST SP 800-101 Rev. 1 for more information. 

Read More

Buffer Overflow

Buffer Overflow

A condition at an interface under which more input can be placedinto a buffer or data holding area than the capacity allocated, overwritingother information. Adversaries ...

Read More

Buffer Overflow Attack

Buffer Overflow Attack

A method of overloading a predefined amount of space in a buffer, which can potentially overwrite and corrupt memory in data.  See NIST SP 800-72 for more information. A ...

Read More

BCP

BCP

Business Continuity PlanThe documentation of a predetermined set of instructions or procedures that describe how an organization’s mission/business processes will be sustained during and after ...

Read More

Business Impact Analysis

Business Impact Analysis

An analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption. See CNSSI ...

Read More

Byte

Byte

A group of eight bits that is treated either as a single entity or as an array of 8 individual bits.  See FIPS 197 for more information. A bit ...

Read More

Byte String

Byte String

An ordered sequence of bytes.  See NIST SP 800-56B Rev. 1 and NIST SP 800-56A Rev. 2 under Byte string for more information.   A finite, ordered sequence of bytes.  See NIST SP 800-38D for more ...

Read More