The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Boot Sector
Boot Sector: A region of a storage device containing machine code to be loaded into RAM by a computer system's built-in firmware during the boot-up process. It typically includes a small program that tells the computer how to load the operating system and start the initial processes. The boot sector is a critical component in system startup and is often targeted by malware to control the boot process.
- Boot Sector Virus
Boot Sector Virus: A type of malware that infects the boot sector of storage devices (like hard drives or removable media). Once installed, it is loaded into memory every time the system starts up, enabling it to persist even after a system reboot. It can potentially take control of the system before the operating system is fully loaded, making it particularly dangerous and difficult to detect and remove with standard antivirus tools.
- Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP): The protocol that manages how packets are routed across the Internet by exchanging information between autonomous systems (ASes). BGP is used to determine the best available paths for data packet delivery and to maintain a table of IP network routes, which are dynamically updated in response to changes in the network.
- Bot
Bot: Short for robot, in a digital context, refers to an automated program designed to perform specific tasks without human intervention. These tasks can range from benign activities, such as web crawling for search engines, to malicious uses, such as launching distributed denial-of-service attacks (DDoS), spreading spam, or perpetrating click fraud. Because of their potential for misuse, it's crucial to monitor network activities for unusual patterns that may suggest the presence of malicious bots.
- Botnet
Botnet: A network of infected computers that are controlled by a single entity, often without the knowledge of the computers' owners. Botnets are typically used to perform distributed denial of service (DDoS) attacks, in which the botnet is used to flood a target website or network with traffic, overwhelming its resources and rendering it inaccessible. Examples of botnets include the Mirai botnet, which was used in several high-profile DDoS attacks, and the Storm botnet, which was one of the largest botnets in history.
- Boundary
Boundary: In the context of system security, a boundary refers to the defined barrier between different security domains, helping to manage and restrict the flow of information. This could be physical, such as the walls of a secured server room, or logical, such as a firewall or other security device that filters network traffic. Properly managed boundaries are crucial in limiting potential attack vectors and containing any damage if a breach does occur. A system's boundary protection mechanisms should be defined based on the sensitivity of the information it handles and the potential threats it faces.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access