The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP): The protocol that manages how packets are routed across the Internet by exchanging information between autonomous systems (ASes). BGP is used to determine the best available paths for data packet delivery and to maintain a table of IP network routes, which are dynamically updated in response to changes in the network.
- Bot
Bot: Short for robot, in a digital context, refers to an automated program designed to perform specific tasks without human intervention. These tasks can range from benign activities, such as web crawling for search engines, to malicious uses, such as launching distributed denial-of-service attacks (DDoS), spreading spam, or perpetrating click fraud. Because of their potential for misuse, it's crucial to monitor network activities for unusual patterns that may suggest the presence of malicious bots.
- Botnet
Botnet: A network of infected computers that are controlled by a single entity, often without the knowledge of the computers' owners. Botnets are typically used to perform distributed denial of service (DDoS) attacks, in which the botnet is used to flood a target website or network with traffic, overwhelming its resources and rendering it inaccessible. Examples of botnets include the Mirai botnet, which was used in several high-profile DDoS attacks, and the Storm botnet, which was one of the largest botnets in history.
- Boundary
Boundary: In the context of system security, a boundary refers to the defined barrier between different security domains, helping to manage and restrict the flow of information. This could be physical, such as the walls of a secured server room, or logical, such as a firewall or other security device that filters network traffic. Properly managed boundaries are crucial in limiting potential attack vectors and containing any damage if a breach does occur. A system's boundary protection mechanisms should be defined based on the sensitivity of the information it handles and the potential threats it faces.
- Bounds Checking
Bounds Checking: The practice of verifying that the data being operated on falls within the expected parameters or 'bounds.' For instance, in a data array, it would mean ensuring an index does not exceed the size of the array. This prevents errors, crashes, and security vulnerabilities like buffer overflow attacks, where an attacker can exploit an out-of-bounds write to inject malicious code or manipulate the system's operation.
- Breach Attack Simulations (BAS)
Breach Attack Simulations (BAS): These are controlled tests carried out to mimic the tactics and techniques of real-world attackers to assess the effectiveness of an organization's security posture. By emulating the actions of potential threats in a safe environment, BAS allows organizations to identify potential vulnerabilities, test their response procedures, and understand where improvements might be needed before an actual attack occurs. This proactive approach is a key part of maintaining a robust defense against increasingly sophisticated threats.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access