Explore essential cybersecurity terms starting with the letter B, from backup and biometric authentication to bootkit and behavior-based detection.

Botnet
A Botnet is a network of compromised computers or devices that can be remotely controlled by an attacker to perform malicious activities, such as launching distributed denial of service (DDoS) attacks.
Brute Force Attack
A Brute Force Attack is a method of cracking passwords or encryption by attempting all possible combinations until the correct one is found.
Backup
Backup refers to the process of copying and storing data in a secure location to protect against data loss due to hardware failure, human error, or cyber attacks.
Browser Hijacking
Browser Hijacking is a type of cyber attack that takes control of a user’s web browser, often redirecting the user to malicious websites or installing unwanted software.
Bot
A Bot, short for robot, is a software application designed to perform automated tasks over the internet, often used for malicious purposes such as spamming, phishing, or DDoS attacks.
Black Hat Hacker
A Black Hat Hacker is a malicious hacker who uses their skills to gain unauthorized access to systems, steal data, or cause damage to networks or devices.
Bricking
Bricking refers to the intentional or unintentional act of rendering a device or system unusable, often through software manipulation or modification.
Bluetooth Hacking
Bluetooth Hacking is a type of cyber attack that exploits vulnerabilities in Bluetooth-enabled devices to gain unauthorized access or steal sensitive information.
Biometric Authentication
Biometric Authentication is a security method that uses unique physical or behavioral characteristics of an individual, such as fingerprints, facial recognition, or voice recognition, to verify their identity.
Binary Code
Binary Code is a system of representing data and instructions using only two digits, usually 0 and 1, which are interpreted by computers and other electronic devices.
Business Continuity Planning (BCP)
Business Continuity Planning (BCP) is a process of developing and implementing strategies and procedures to ensure that essential business functions can continue during and after a disaster or other disruptive event.
Bot Herder
A Bot Herder is a person who creates or controls a Botnet, often for malicious purposes such as launching cyber attacks or stealing sensitive information.
Backdoor
A Backdoor is a hidden entry point in a computer system or software application that allows unauthorized access to the system or application.
Banner Grabbing
Banner Grabbing is a technique used to gather information about a target computer system or network by retrieving the banner or header information from a service or application running on the system.
Bluejacking
Bluejacking is a type of cyber attack that sends unsolicited messages or data to Bluetooth-enabled devices, often to promote a product or service.
Blacklist
A Blacklist is a list of IP addresses, domain names, or other identifiers that are blocked or restricted from accessing a network or system, usually due to a history of malicious or suspicious activity.
Behavioral Analytics
Behavioral Analytics is a process of analyzing user behavior and activity patterns to identify and prevent cyber threats, such as insider attacks or account takeovers.
Block Cipher
A Block Cipher is a type of encryption that operates on fixed-size blocks of data, typically using a secret key to transform the data into ciphertext.
Blockchain Security
Blockchain Security refers to the measures and techniques used to protect the integrity, confidentiality, and availability of data stored on a blockchain, a distributed and decentralized ledger technology.
Boot Sector Virus
A Boot Sector Virus is a type of virus that infects the boot sector of a storage device, such as a hard drive or floppy disk, and spreads to other devices or systems through file sharing or other means.
Branded Spear Phishing
Branded Spear Phishing is a type of targeted phishing attack that uses the branding and logos of a well-known company or organization to trick users into revealing sensitive information or downloading malware.
Browser Extension Security
Browser Extension Security refers to the measures and best practices used to ensure the security and privacy of browser extensions, which are small software programs that add functionality to web browsers.
Business Email Compromise (BEC)
Business Email Compromise (BEC) is a type of cyber attack that uses social engineering and phishing techniques to impersonate an executive or employee in a company and fraudulently obtain money or sensitive information.
Binary Exploitation
Binary Exploitation is a type of cyber attack that targets vulnerabilities in compiled binary code to execute malicious code, gain unauthorized access, or steal sensitive data.
Beaconing
Beaconing is a technique used by malware to periodically send small amounts of data to a command and control (C2) server, indicating that the malware is still active and awaiting further instructions.
Business Impact Analysis (BIA)
Business Impact Analysis (BIA) is a process of identifying and analyzing the potential impacts of a disruption to business operations, such as a cyber attack or natural disaster, to prioritize recovery efforts.
Blind SQL Injection
Blind SQL Injection is a type of cyber attack that exploits vulnerabilities in web applications to inject malicious SQL code into a database, often without the attacker having direct access to the database.
Binary Tree
A Binary Tree is a data structure used in computer science and mathematics to represent hierarchical relationships between elements, typically used for searching and sorting algorithms.
Browser Isolation
Browser Isolation is a security technique that isolates web browsers from the underlying operating system and network, typically using virtualization or sandboxing, to prevent web-based cyber attacks.
Bot Imitation
Bot Imitation is a technique used by attackers to mimic the behavior of a legitimate user or bot to bypass security measures, such as CAPTCHA or IP blocking.
Big Data Analytics
Big Data Analytics is a process of analyzing and extracting insights from large and complex datasets using advanced algorithms and tools, often used for cybersecurity to detect and prevent cyber threats.
Behavioral Biometrics
Behavioral Biometrics is a type of biometric authentication that uses unique behavioral patterns of an individual, such as mouse movements, keystrokes, or swipes, to verify their identity.
Bootkit
A Bootkit is a type of malware that infects the master boot record (MBR) or boot sector of a storage device, allowing the attacker to control the boot process and evade detection by traditional security measures.
Blind Spot
A Blind Spot is an area of a computer system or network that is not monitored or protected by security measures, leaving it vulnerable to cyber attacks.
Botmaster
A Botmaster is a person who creates or controls a Botnet, often for malicious purposes such as launching cyber attacks or stealing sensitive information.
Browser Sandbox
A Browser Sandbox is a virtual environment that isolates web browsers from the underlying operating system and network, often used for testing or secure browsing.
Blockchain Mining
Blockchain Mining is the process of verifying and adding transactions to a blockchain ledger, typically using specialized computer hardware and software to solve complex mathematical puzzles.
Beacon Frequency
Beacon Frequency refers to the rate at which a malware beacon sends data to a command and control (C2) server, often used to evade detection by security measures.
Behavioral Detection
Behavioral Detection is a method of detecting cyber threats based on unusual or suspicious behavior patterns, often using machine learning or artificial intelligence algorithms.
Bit
A Bit, short for binary digit, is the smallest unit of digital information, typically represented by a 0 or 1.
Business Process Compromise (BPC)
Business Process Compromise (BPC) is a type of cyber attack that targets the business processes and operations of a company, often using social engineering or spear phishing techniques.
Blacklist Filter
A Blacklist Filter is a security measure that blocks or restricts access to specific IP addresses, domain names, or other identifiers that are known to be malicious or suspicious.
Binary Analysis
Binary Analysis is the process of analyzing and understanding the behavior and vulnerabilities of compiled binary code, typically used for reverse engineering or vulnerability assessment.
Bitlocker
Bitlocker is a built-in encryption feature in Microsoft Windows operating systems, designed to encrypt and protect data on hard drives and other storage devices.
Bloatware
Bloatware is a type of software that is pre-installed on a computer or mobile device, often causing performance issues or security vulnerabilities.
Bot Controller
A Bot Controller is a person or group that controls a Botnet, often using command and control (C2) servers to issue instructions and collect information.
Blockchain Node
A Blockchain Node is a computer or device that participates in a blockchain network, typically used to validate and record transactions and maintain the integrity of the blockchain ledger.
Browser Fingerprinting
Browser Fingerprinting is a technique used to track or identify users based on the unique characteristics of their web browser, such as installed fonts, plug-ins, or screen resolution.
Biometric Authentication
Biometric Authentication is a type of authentication that uses unique biological characteristics of an individual, such as fingerprints, facial recognition, or iris scans, to verify their identity.
Bypass Attack
A Bypass Attack is a type of cyber attack that exploits vulnerabilities in security measures or protocols to bypass access controls or other protections.
Block Cipher
A Block Cipher is a type of encryption that encrypts data in fixed-size blocks, typically using a specific key or algorithm to scramble the data.
Bluejacking
Bluejacking is a type of cyber attack that uses Bluetooth technology to send unsolicited messages or spam to nearby devices, often used for advertising or social engineering purposes.
Blackout Attack
A Blackout Attack is a type of cyber attack that targets power grids or other critical infrastructure, often using malware or other tools to cause a widespread blackout or disruption.
Buffer Overflow
A Buffer Overflow is a type of cyber attack that exploits vulnerabilities in software applications to overflow a buffer or memory space, typically causing the application to crash or execute malicious code.
Bot Traffic
Bot Traffic refers to the traffic generated by bots, often used for web scraping, content indexing, or DDoS attacks.
Backup and Recovery Plan
A Backup and Recovery Plan is a comprehensive plan for protecting data and recovering from data loss or system failures, typically involving regular backups, redundancy, and testing.
Baseline Security
Baseline Security refers to the minimum level of security measures and controls required to protect a system or network from common threats and vulnerabilities.
Behavior-based Detection
Behavior-based Detection is a type of cybersecurity threat detection that uses machine learning or artificial intelligence algorithms to analyze and detect anomalous or suspicious behavior patterns in network traffic or user behavior.
Bug Bounty Program
A Bug Bounty Program is a program that rewards individuals or security researchers for identifying and reporting security vulnerabilities or weaknesses in software applications or systems.
BIOS Password
A BIOS Password is a password that is required to access or modify the BIOS settings on a computer or device, typically used to prevent unauthorized changes or access.
Browser Extension
A Browser Extension is a software module that extends the functionality of a web browser, typically installed by users to enhance their browsing experience or add new features.
Download Infographics
Simply click on the letter corresponding to the infographic you’d like to download, and save the picture to your device.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Get terms per letter
Simply click on the letter corresponding to the terms you would like to see.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cybersecurity Infographic for B
