BYOD |
Bring your own device (BYOD) refers to employees using personal devices to connect to their organisational networks. |
Bug |
A bug refers to an error, fault or flaw in a computer program that may cause it to unexpectedly quit or behave in an unintended manner. |
Brute Force Attack |
Brute force attack is an activity which involves repetitive successive attempts of trying various password combinations to break into any website. |
Broadband |
High-speed data transmission system where the communications circuit is shared between multiple users. |
Botnet |
A botnet is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware. |
Blackhat |
Black hat hacker refers to a hacker that violates computer security for personal gain or malice. |
BCP (Business Continuity Planning) |
A business management plan used to resolve issues that threaten core business tasks. |
Baiting |
Online baiting involves enticing a victim with an incentive. |
Backup |
To make a copy of data stored on a computer or server to reduce the potential impact of failure or loss. |
Back door |
A backdoor is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system. |