Glossary

A B C D E F H I K L M N P R S T U V W Z
BYOD

Bring your own device (BYOD) refers to employees using personal devices to connect to their organisational networks.

Bug

A bug refers to an error, fault or flaw in a computer program that may cause it to unexpectedly quit or behave in an unintended manner.

Brute Force Attack

Brute force attack is an activity which involves repetitive successive attempts of trying various password combinations to break into any website.

Broadband

High-speed data transmission system where the communications circuit is shared between multiple users.

Botnet

A botnet is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware.

Blackhat

Black hat hacker refers to a hacker that violates computer security for personal gain or malice.

BCP (Business Continuity Planning)

A business management plan used to resolve issues that threaten core business tasks. 

Baiting

Online baiting involves enticing a victim with an incentive.

Backup

To make a copy of data stored on a computer or server to reduce the potential impact of failure or loss.

Back door

A backdoor is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.