Archives: Glossary Terms

Bombe

an electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War.

Read More

Bot

A program that does automated tasks. In cyber security, commonly used to describe a malware-infected computer that carries out tasks set by someone other than the device’s legitimate user.

Read More

Botnet

A network of bots—a set of Internet-connected programs communicating with similar programs to collaboratively perform tasks. Botnets may be benign, but in common usage are generally not understood to be...

Read More

Browser

A software application for retrieving, presenting and traversing information resources on the World Wide Web.

Read More

Brushing 

The practice of sending unwanted, unordered, and often counterfeit products to unsuspecting people in the hope of generating positive reviews. Brushing is sometimes also used to give marks a compromised...

Read More

Brute-force attack

An exhaustive search for a cryptographic key or password that proceeds by systematically trying all alternatives until it hits on the right ones. A very resource-intensive approach. Contrast “dictionary attack.”

Read More

BSIMM 

Acronym for Building Security In Maturity Model.

Read More

Buffer 

A physical memory storage location in a device where data are temporarily stored.

Read More

Buffer overflow

An anomaly in which a program overruns a buffer’s boundary while writing data to that buffer, and so overwrites adjacent memory. A buffer overflow violates memory safety.

Read More

Building Security In Maturity Model

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. Commonly known by its acronym, BSIMM.

Read More