JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
B
B
B Channel
B1
B1FF*
B2
B3
Back Door
Backbone Site*
Backdoor
Backdoor account
Backdoor Trojan
Backgammon*
Background checks
Background Investigations #
Background Processing
Background*
Backspace And Overstrike*
Back-To-Back Connection
Backup
Backup console
Backup facility
Backup File
Backup Plan
Backup Procedures
Backup retention plan
Backups#
Backward Channel
Backward Combatability*
Backward Recovery
Bacterium
Bad Thing*
BAD*
Balanced Code
Banana Label*
Band
Bandwidth
Bandwidth Compression
Bang
Bang On*
Bang Path*
Banner
Banner*
Bar Code
Bare Metal*
Baroque*
Base
Base Address
Base C4 Systems Security Office
Base Computer Systems Security Officer
Baseband
Baseline
Baselines
Basic Software
Basic Software (nonfunctional)
Basic Status
BASIC*
Basic/Generic Management Issues#
Bastion host
Batch mode
Batch Processing
Batch scripts
Batch*
Baterium
Bathtub Curve*
Baud
Baud Rate
Baudot Code
Bboard*
BBS
BCC
BCD
BCI
BCSSO
Bd
Beam*
Beanie Key*
Bearer Channel
Bearer Service
Beep*
Behavioral scanning
Bell-La Padula
Bell-La Padula Security Model
Bell-LaPadula Model
Bells And Whistles*
Benign
Benign Environment
Benign payload
BER
BERT
Best practices
Beta*
Between-The-Lines Entry
Beyond A1
Bible*
BiCapitalization*
Biff*
Big Gray Wall*
Big Iron*
Big Red Switch*
Big Room, The*
Big Win*
Big-Endian*
Bignum*
Bigot*
Binary
Binary Code
Binary Digit
Binary Element
Binary Exponential Backoff
Binary Notation
Binary Synchronous Communication
Binary-Coded Decimal
Binary-Coded Decimal Code
Binary-Coded Decimal Interchange Code
Binary-Coded Decimal Notation
Binary-Coded Decimal Representation
Binding
Binding/Handshaking#
Biometric
Biometric authentication
Biometrics#
BIOS password
B-ISDN
Bi-Sync
Bit
Bit Bang*
Bit Bashing*
Bit Bucket*
Bit Configuration
Bit Decay*
Bit Density
Bit Error Rate
Bit Error Ratio
Bit Error Ratio Tester
Bit Interval
Bit Inversion
Bit Pairing
Bit Position
Bit Rate
Bit Robbing
Bit Rot*
Bit Slip
Bit Stream Transmission
Bit String
Bit Synchronization
Bit Twiddling*
Bitblt*
Bit-By-Bit Asynchronous Operation
Bit-Count Integrity
BITNET*
Bit-Paired Keyboard*
Bits Per Inch
Bits Per Second
Bits*
Bit-Sequence Independence
Bit-Stepped
Bit-Synchronous Operation
BIU
Bixie*
Black
Black Art*
BLACK Equipment Area (BEA)
Black hat hackers
Black hole
Black Hole*
Black Key
BLACK Line
BLACK Signal
Blanking
Blast*
Blended threats
Blink*
Blinkenlights*
Blinking
Blit*
Blitter*
Blivet*
BLOB*
Block
Block Character
Block Check
Block Check Character
Block Code
Block Diagram
Block encryption
Block Length
Block Parity
Block Transfer
Block Transfer Attempt
Block Transfer Computations*
Block Transfer Efficiency
Block Transfer Failure
Block Transfer Rate
Block Transfer Time
Block-Error Probability
Blocking
Blocking Criterion
Blocking Factor
Blocking Formulas
Block-Loss Probability
Block-Misdelivery Probability
Blow An EPROM*
Blow Away*
Blow Out*
Blow Past*
Blow Up*
BLT*
Blue Book*
Body
Border firewalls
Bourne Shell and Bourne Again Shell (BASH)
BPI
BPOC
BPS
BQS*
BR
Breach
Bridge
Broken Arrow*
Broken*
Broket*
Brooks's Law*
Browsing
BRS*
Brute Force And Ignorance*
Brute Force*
Brute-force guessing
BSA
BSD*
BSE
Bubble Sort*
Bucky Bits*
Budget
Budget And Accounting Act
Budget And Accounting Procedures Act Of 1950
Buffer
Buffer overflow
Buffer Overflow*
Bug
Bugging
Bulk Encryption
Bulletproof*
Bum*
Bump*
Burble*
Buried Treasure*
Burn-In Period*
Burst Page*
Burst Transmission#
Bus
Bus Interface Unit
Bus Topology
Business Aspects Of Information Security#
Business champions
Business continuity plan
Business process analysis
Busy Back
Busy-Wait*
Buzz*
BW
BWQ*
By Hand*
Byte
Bare Metal*
n. New computer hardware, unadorned with such snares and delusions as an operating system, an HLL, or even assembler. Commonly used in the phrase `programming on the bare metal', which refers to the arduous work of bit bashing needed to create these basic tools for a new machine. Real bare-metal programming involves things like building boot proms and BIOS chips, implementing basic monitors used to test device drivers, and writing the assemblers that will be used to write the compiler back ends that will give the new machine a real development environment.
`Programming on the bare metal' is also used to describe a style of hand-hacking that relies on bit-level peculiarities of a particular hardware design, esp. tricks for speed and space optimization that rely on crocks such as overlapping instructions (or, as in the famous case described in The Story of Mel, a Real Programmer, interleaving of opcodes on a magnetic drum to minimize fetch delays due to the device's rotational latency). This sort of thing has become less common as the relative costs of programming time and machine resources have changed, but is still found in heavily constrained environments such as industrial embedded systems, and in the code of hackers who just can't let go of that low-level control. See Real Programmer. In the world of personal computing, bare metal programming (especially in sense 1 but sometimes also in sense is often considered a Good Thing, or at least a necessary evil (because these machines have often been sufficiently slow and poorly designed to make it necessary; see ill-behaved). There, the term usually refers to bypassing the BIOS or OS interface and writing the application to directly access device registers and machine addresses. "To get 19. 2 kilobaud on the serial port, you need to get down to the bare metal. " People who can do this sort of thing well are held in high regard.