- Blockchain A distributed database that maintains a continuously growing list of records (blocks) secured by cryptography. It is used in digital currencies and distributed systems to provide a secure and transparent way of storing and verifying data. For example, a blockchain network can be used to record and verify transactions in a decentralized manner without the need for a central authority.
- Block CipherA method of encrypting text where it is divided into blocks, each of which is then encrypted. The encryption of each block happens independently using a symmetric key, meaning the same key is used for both encryption and decryption. The size of the block and the key determines the type of block cipher, such as AES (Advanced Encryption Standard), which is widely used and considered highly secure. The utility of block ciphers in securing data in transit or at rest makes them a critical component in various protocols and applications.
- BlowfishA symmetric-key block cipher invented by Bruce Schneier in 1993. Designed as a general-purpose algorithm, it uses variable-length keys, making it ideal for both domestic and exportable use. Despite its age, Blowfish remains widely utilized due to its speed, simplicity, and security. However, its successor, Twofish, offers enhancements such as larger block sizes and additional security features.
- Bluejacking The practice of sending unsolicited messages or files to Bluetooth-enabled devices. It is used in wireless communication to send short messages or files to nearby devices without the need for a direct connection. For example, Bluejacking can be used to send a promotional message to nearby phones with Bluetooth enabled.
- Bluesnarfing A type of unauthorized access to a wireless device through a Bluetooth connection, often between phones, desktops, or laptops. This attack allows access to stored information, like email messages, contact lists, or calendars, without alerting the device's user. Unlike Bluejacking, which primarily involves sending unsolicited messages, Bluesnarfing is a serious security concern as it allows for theft of information and unauthorized access to personal data.
- Blue team A team of security professionals who focus on defensive measures to protect an organization's information systems. It is used in cybersecurity to defend against cyber-attacks and prevent data breaches. Examples include regular security audits, implementing security protocols, and monitoring network traffic.
- Bluetooth A wireless technology standard used for exchanging data between fixed and mobile devices over short distances. It utilizes short-wavelength UHF radio waves and is primarily designed for low power consumption. Bluetooth has become a common feature in many types of hardware, from computers and smartphones to audio equipment and car audio systems. Like any wireless technology, it has potential vulnerabilities and can be exploited if not properly secured, such as in the case of Bluejacking or Bluesnarfing.
- Boot Sector A region of a storage device containing machine code to be loaded into RAM by a computer system's built-in firmware during the boot-up process. It typically includes a small program that tells the computer how to load the operating system and start the initial processes. The boot sector is a critical component in system startup and is often targeted by malware to control the boot process.
- Boot Sector Virus A type of malware that infects the boot sector of storage devices (like hard drives or removable media). Once installed, it is loaded into memory every time the system starts up, enabling it to persist even after a system reboot. It can potentially take control of the system before the operating system is fully loaded, making it particularly dangerous and difficult to detect and remove with standard antivirus tools.
- Border Gateway Protocol (BGP) The protocol that manages how packets are routed across the Internet by exchanging information between autonomous systems (ASes). BGP is used to determine the best available paths for data packet delivery and to maintain a table of IP network routes, which are dynamically updated in response to changes in the network.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.