- Backbone The primary network infrastructure within a system that carries data across different nodes. Typically, it comprises high-speed connectivity paths that enable efficient routing and data transfer across large geographical areas. In complex network architectures, the backbone forms the critical "spinal cord" connecting various subnetworks, supporting smooth and reliable operations.
- Backdoor A method, often covert, that bypasses normal authentication or encryption in a system, allowing unauthorized access or control. Typically associated with malicious intent, these can be inserted intentionally for maintenance or troubleshooting but may also be exploited by adversaries to gain unpermitted access, which can lead to information theft, system damage, or other adverse impacts.
- Background Check The process of verifying an individual's personal and professional history. In cybersecurity, this is a crucial step in vetting personnel who will have access to sensitive data, systems, or facilities. It typically involves reviewing criminal records, employment history, and other relevant information to assess potential security risks.
- Backout Contingency Plan A strategic plan outlining steps to revert changes made during system updates or modifications should these changes result in unforeseen issues or failures. This could include procedures to restore data from backups, reinstating prior configurations, or rolling back software updates. It plays a critical role in maintaining system stability and minimizing downtime, especially in high-risk environments where system reliability is paramount.
- Backup Contingency Plan A comprehensive strategy aimed at maintaining data availability and system functionality in the event of data loss, system failures, or disasters. This plan details the mechanisms, processes, and resources for creating, managing, and restoring from data backups. It is a fundamental component of a robust digital environment, ensuring business continuity and minimizing the negative impact of potential disruptions.
- Backup or Backing Up The process of creating copies of data that can be used to restore the original information in the event of data loss, corruption, or system failures. This is a critical process in safeguarding data and ensuring business continuity, enabling the restoration of data from a previous point in time and reducing potential damage or disruptions caused by unforeseen events.
- Backup Storage Strategies The methodology and planning involved in determining how and where backup data is stored. This might encompass decisions about the type of storage (local, off-site, or cloud), the format of the backup (full, incremental, or differential), and the frequency of backup creation. An effective strategy balances data protection needs, cost, and business continuity objectives to ensure a reliable and efficient recovery process.
- Backup verification data Data that is used to verify the integrity and accuracy of a backup copy. It is used in cybersecurity to ensure that a backup copy can be used to restore an organization's data in case of a disaster or data loss. Examples include checksum values for each file in a backup, timestamps for each file in a backup, and metadata for each file in a backup.
- Badge A physical or digital identifier that is used to verify the identity of an individual or the authorization of a device. It is commonly used in the context of access control to ensure that only authorized individuals or devices can enter a secured area or access sensitive information. Examples of badges include a security card, a key fob, or a digital certificate.
- Balanced Magnetic Switch (BMS) A security device used to monitor the opening and closing of doors and windows. It consists of a magnet and a sensor that form a circuit, which, when disturbed (for example, by a door opening), triggers an alert. BMS systems are commonly integrated into broader security systems to detect unauthorized entries.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.