Glossary

All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
There are currently 19 names in this directory beginning with the letter B.
B
Back links / Inward links
A backlink is any link received by a web node (web page, directory, website, or top level domain) from another web node.  [ Type : Analysis ]
Bastion host
A host with very few services/applications running on it, usually put between the internal network and the internet. This point acts as a proxy and is the only entry point to the internal network. [ Type : Terminology ]
BGP peers
When BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (EBGP or Exterior Border Gateway Protocol). [ Type : Terminology ]
BGP route
When BGP runs between two peers in the same autonomous system (AS), it is referred to as Internal BGP (iBGP or Interior Border Gateway Protocol). When it runs between different autonomous systems, it is called External BGP (EBGP or Exterior Border Gateway Protocol). [ Type : Terminology ]
BIN
Bank Identification Number. Which is the starting digits of a credit card, most commonly 6 or 8 digits.
Bitsquatting
Refers to the registration of a domain names one bit different than a popular domain. The name comes from typo-squatting: the act of registering domain names one key press different than a popular domain. [ Type : Terminology ]
Black Hat SEO
In search engine optimization (SEO) terminology, Black Hat SEO refers to the use of aggressive SEO strategies, techniques and tactics that focus only on search engines and not a human audience, and usually does not obey search engines guidelines. [ Type : Terminology ]
Blackbox Testing - Whitebox testing - Graybox Testing
Scenarios that an ethical hacker will face while performing penetrations testing.
Blackbox testing: the hacker does not know the in/outs of the IT infrastructure. Usually launches a full scale brute force attack to reveal vulnerabilities. Can be very time consuming.
Whitebox testing: attacker has full knowledge and access to the source code and infrastructure. A more thorough test can be performed in this type of pen testing.
Graybox testing: attacker has partial knowledge/access, and can focus on specific weaknesses and discover more as he moves along. [ Type : Terminology ]
Blended Attack
A cyber attack that comprises multiple attack vectors and malware is known as a blended attack. Such attacks usually cause severe damage to targeted systems. [ Type : Terminology ]
Botnet
Botnet comprises of multiple Internet-connected devices, each of which is running one or more bots. Botnets may be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allows the attacker to access the device and its connection. [ Type : Terminology ]
Brand Casting
Promoting a brand, product or service by streaming video of events, product demonstrations and other offline experiences through online media channels. [ Type : Response ]
Brand Infringement
Brand infringement is an encroachment, violation, misappropriation, and/or disparagement of a message, identity, goodwill, talent, work, products, and intellectual property rights of a brand. [ Type : Attack ]
Brand jacking
Activity whereby someone acquires or otherwise assumes the online identity of another entity for the purposes of acquiring that person's or business's brand equity. [ Type : Attack ]
Brand Management
The activity of supervising the promotion of a particular brand of goods. [ Type : Service Suite ]
Brand Protection
The ​act of preventing someone from ​illegally making and ​selling a ​product using a ​brand ​name ​owned by another ​company [ Type : Service Suite ]
Buffer Overflow
When data being entered exceeds a buffer's fixed length, the data then starts overflowing adjacent memory space causing system shutdown, data corruption, or give the attacker access to the rest of the system. [ Type : Terminology ]
Bullet proof hosting
Bulletproof hosting (sometimes known as bulk-friendly hosting) is a service provided by some domain hosting or web hosting firms that allows their customer considerable leniency in the kinds of material they may upload and distribute. [ Type : Terminology ]
Business Email Compromise (BEC)
Business Email Compromise (BEC) is a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds. [ Type : Terminology ]
Business email compromise (BEC)
Business email compromise (BEC) scams that attempt to trick senior staff at medium and large corporations into transferring large sums of money typically rely on the same formats - either compromising the CEO's account, spoofing the CEO's email address, or using a form of typo-squatting where the email address uses a domain which resembles the targeted company's actual domain. [Type: Attack]