Bombe
an electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War.
An exhaustive search for a cryptographic key or password that proceeds by systematically trying all alternatives until it hits on the right ones. A very resource-intensive approach. Contrast “dictionary attack.”
An anomaly in which a program overruns a buffer’s boundary while writing data to that buffer, and so overwrites adjacent memory. A buffer overflow violates memory safety.
A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. Commonly known by its acronym, BSIMM.