Archives: Glossary

635 posts
Black Box Testing

Black Box Testing

Black Box Testing is a software testing method that involves testing a system without any knowledge of its…
Blended Threat

Blended Threat

A blended threat is a type of computer security attack that utilizes multiple methods to exploit vulnerabilities in…
Bloatware

Bloatware

Bloatware refers to pre-installed software on a device or computer system that takes up valuable storage space, processing…
Block List, Deny List

Block List, Deny List

Block List and Deny List are terms used in computer networking and cybersecurity to refer to a list…
Blue Team

Blue Team

Blue Team is a term used in the field of cybersecurity to refer to the group of professionals…
Bluejacking

Bluejacking

Bluejacking is a term used to describe the act of sending unsolicited messages or data to a Bluetooth-enabled…
Bogon

Bogon

A bogon is a bogus IP address that is used in the internet and not valid for communication.…
Boot Sector Virus

Boot Sector Virus

A boot sector virus is a type of computer virus that infects the boot sector of a storage…
Brute Force Attack

Brute Force Attack

A brute force attack is a cybersecurity technique that attempts to guess a password or encryption key through…
Buffer Overflow Attack

Buffer Overflow Attack

A buffer overflow attack is a type of computer security vulnerability that occurs when a program or application…
Business Email Compromise (BEC)

Business Email Compromise (BEC)

Business Email Compromise (BEC) is a type of cyber-attack where fraudsters use social engineering tactics to trick victims…