JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
B
B
B Channel
B1
B1FF*
B2
B3
Back Door
Backbone Site*
Backdoor
Backdoor account
Backdoor Trojan
Backgammon*
Background checks
Background Investigations #
Background Processing
Background*
Backspace And Overstrike*
Back-To-Back Connection
Backup
Backup console
Backup facility
Backup File
Backup Plan
Backup Procedures
Backup retention plan
Backups#
Backward Channel
Backward Combatability*
Backward Recovery
Bacterium
Bad Thing*
BAD*
Balanced Code
Banana Label*
Band
Bandwidth
Bandwidth Compression
Bang
Bang On*
Bang Path*
Banner
Banner*
Bar Code
Bare Metal*
Baroque*
Base
Base Address
Base C4 Systems Security Office
Base Computer Systems Security Officer
Baseband
Baseline
Baselines
Basic Software
Basic Software (nonfunctional)
Basic Status
BASIC*
Basic/Generic Management Issues#
Bastion host
Batch mode
Batch Processing
Batch scripts
Batch*
Baterium
Bathtub Curve*
Baud
Baud Rate
Baudot Code
Bboard*
BBS
BCC
BCD
BCI
BCSSO
Bd
Beam*
Beanie Key*
Bearer Channel
Bearer Service
Beep*
Behavioral scanning
Bell-La Padula
Bell-La Padula Security Model
Bell-LaPadula Model
Bells And Whistles*
Benign
Benign Environment
Benign payload
BER
BERT
Best practices
Beta*
Between-The-Lines Entry
Beyond A1
Bible*
BiCapitalization*
Biff*
Big Gray Wall*
Big Iron*
Big Red Switch*
Big Room, The*
Big Win*
Big-Endian*
Bignum*
Bigot*
Binary
Binary Code
Binary Digit
Binary Element
Binary Exponential Backoff
Binary Notation
Binary Synchronous Communication
Binary-Coded Decimal
Binary-Coded Decimal Code
Binary-Coded Decimal Interchange Code
Binary-Coded Decimal Notation
Binary-Coded Decimal Representation
Binding
Binding/Handshaking#
Biometric
Biometric authentication
Biometrics#
BIOS password
B-ISDN
Bi-Sync
Bit
Bit Bang*
Bit Bashing*
Bit Bucket*
Bit Configuration
Bit Decay*
Bit Density
Bit Error Rate
Bit Error Ratio
Bit Error Ratio Tester
Bit Interval
Bit Inversion
Bit Pairing
Bit Position
Bit Rate
Bit Robbing
Bit Rot*
Bit Slip
Bit Stream Transmission
Bit String
Bit Synchronization
Bit Twiddling*
Bitblt*
Bit-By-Bit Asynchronous Operation
Bit-Count Integrity
BITNET*
Bit-Paired Keyboard*
Bits Per Inch
Bits Per Second
Bits*
Bit-Sequence Independence
Bit-Stepped
Bit-Synchronous Operation
BIU
Bixie*
Black
Black Art*
BLACK Equipment Area (BEA)
Black hat hackers
Black hole
Black Hole*
Black Key
BLACK Line
BLACK Signal
Blanking
Blast*
Blended threats
Blink*
Blinkenlights*
Blinking
Blit*
Blitter*
Blivet*
BLOB*
Block
Block Character
Block Check
Block Check Character
Block Code
Block Diagram
Block encryption
Block Length
Block Parity
Block Transfer
Block Transfer Attempt
Block Transfer Computations*
Block Transfer Efficiency
Block Transfer Failure
Block Transfer Rate
Block Transfer Time
Block-Error Probability
Blocking
Blocking Criterion
Blocking Factor
Blocking Formulas
Block-Loss Probability
Block-Misdelivery Probability
Blow An EPROM*
Blow Away*
Blow Out*
Blow Past*
Blow Up*
BLT*
Blue Book*
Body
Border firewalls
Bourne Shell and Bourne Again Shell (BASH)
BPI
BPOC
BPS
BQS*
BR
Breach
Bridge
Broken Arrow*
Broken*
Broket*
Brooks's Law*
Browsing
BRS*
Brute Force And Ignorance*
Brute Force*
Brute-force guessing
BSA
BSD*
BSE
Bubble Sort*
Bucky Bits*
Budget
Budget And Accounting Act
Budget And Accounting Procedures Act Of 1950
Buffer
Buffer overflow
Buffer Overflow*
Bug
Bugging
Bulk Encryption
Bulletproof*
Bum*
Bump*
Burble*
Buried Treasure*
Burn-In Period*
Burst Page*
Burst Transmission#
Bus
Bus Interface Unit
Bus Topology
Business Aspects Of Information Security#
Business champions
Business continuity plan
Business process analysis
Busy Back
Busy-Wait*
Buzz*
BW
BWQ*
By Hand*
Byte
Bus Topology
A communication network topology in which nodes are connected serially, requiring all nodes except those at the ends of the bus to have the capability to transmit in, and receive from, two directions in order for all nodes to communicate with all other nodes on the bus; i. e. , with intermediate nodes acting as repeaters or passive transparent nodes. Note: The failure of a single transmission line (channel) linking any two nodes will result in the isolation of a minimum of one node from the rest of the network. See also ring network, star topology, tree topology.