Business Continuity Plan

A framework implemented by a company detailing the procedures to take to maximise your businesses chance of survival subsequent to a business...

January 11, 2023
Buffer Overflow

An attack method that attempts to overwhelm the target system into making mistakes, such as granting unauthorised access or simply breaking and...

January 11, 2023
Brute Force Attack

A type of attack that keeps trying different credentials until it finds a correct set. Brute Force Attacks are a basic form...

January 11, 2023
Bring your own device (BYOD)

Company policy that permits employees to use their own personal devices for work purposes.

January 11, 2023
Breach

When data, devices, networks or systems are accessed in an unauthorised manner after bypassing security mechanisms.

January 11, 2023
Boundary Device

A boundary (or perimeter) device is any Internet facing device. This does not mean any device that can access the internet, but...

January 11, 2023
Blue Team

A group of individuals responsible for analysing systems and the design of new or improved security mechanisms to ensure safety and reduce...

January 11, 2023
Block List

A database or ‘list’ of domain names, IP addresses, email address, users etc that are banned from accessing a system.

January 11, 2023
Baselining

The process of monitoring an employees systems behaviour to identify what behaviour is normal, so that security systems can alert individuals if...

January 11, 2023
Backup

A backup is a copy of your systems that can be used if the current version fails or if the organisation falls...

January 11, 2023
Back Door

An unauthorised or covert method to access a system or application that bypasses normal authentication. While back doors can be used by...

January 11, 2023