Business Continuity Plan

A framework implemented by a company detailing the procedures to take to maximise your businesses chance of survival subsequent to a business...

574 January 11, 2023
Buffer Overflow

An attack method that attempts to overwhelm the target system into making mistakes, such as granting unauthorised access or simply breaking and...

573 January 11, 2023
Brute Force Attack

A type of attack that keeps trying different credentials until it finds a correct set. Brute Force Attacks are a basic form...

572 January 11, 2023
Bring your own device (BYOD)

Company policy that permits employees to use their own personal devices for work purposes.

571 January 11, 2023
Breach

When data, devices, networks or systems are accessed in an unauthorised manner after bypassing security mechanisms.

570 January 11, 2023
Boundary Device

A boundary (or perimeter) device is any Internet facing device. This does not mean any device that can access the internet, but...

569 January 11, 2023
Blue Team

A group of individuals responsible for analysing systems and the design of new or improved security mechanisms to ensure safety and reduce...

568 January 11, 2023
Block List

A database or ‘list’ of domain names, IP addresses, email address, users etc that are banned from accessing a system.

567 January 11, 2023
Baselining

The process of monitoring an employees systems behaviour to identify what behaviour is normal, so that security systems can alert individuals if...

566 January 11, 2023
Backup

A backup is a copy of your systems that can be used if the current version fails or if the organisation falls...

565 January 11, 2023
Back Door

An unauthorised or covert method to access a system or application that bypasses normal authentication. While back doors can be used by...

564 January 11, 2023