The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

A

Attack Mechanism

An attack mechanism is a system or strategy by which a target is hit; the attacker may use different attack mechanisms such as a container or payload to hit the intended target.

Letter for filtering (will be hidden in prod) :

B

Bring Your Own Device

Bring your own device (BYOD) is a policy of the organization allowing its employees to use their personal devices such as smartphones, tablet PCs, laptops for business purposes.

Letter for filtering (will be hidden in prod) :

B

Buffer Overflow

A buffer overflow is when a program tries to store an excess amount of data to a buffer than it can hold, as there is a limit on how much data a buffer can hold, the surplus data overflows to the adjoining buffers. Thus, overwriting the data stored in those buffers, and triggering unpredictable consequences.

Letter for filtering (will be hidden in prod) :

B

Broadcast

A broadcast is a process of transmitting the same message to multiple users simultaneously.

Letter for filtering (will be hidden in prod) :

B

Black Core

A black core is a communication network architecture in which user data traversing a global internet protocol (IP) is end-to-end encrypted at the IP layer.

Letter for filtering (will be hidden in prod) :

B

Boundary 2

The physical and/or logical perimeter of a system.

Letter for filtering (will be hidden in prod) :

B

Brute Force Attack

A brute force attack is the process of finding the solution by constantly trying many probable variants of information such as passwords, deciphered keys, etc., in a random fashion.

Letter for filtering (will be hidden in prod) :

B

Bit Error Rate

A bit error rate is the ratio between the number of bits incorrectly received and the total number of bits transmitted in a telecommunications system.

Letter for filtering (will be hidden in prod) :

B

Biometrics

Biometrics are a security system, which takes into account the unique physiological characteristics of a person such as fingerprints, DNA, hair, etc., for identification purposes.

Letter for filtering (will be hidden in prod) :

B

Block Cipher Algorithm

A block cipher algorithm is a family of functions and their inverses parameterized by a cryptographic key in which the function maps bit strings of a fixed length to bit strings of the same length.