| < Free Open Study > |
|
Backdoor Netbus Trojan Horse, 341, 353
Back doors, 17
Backdoor.Subseven virus, 340, 353
Backups, 203–205, 239–240
copies, 205
differential, 205
full, 204
GFS, 203–204, 239–240
incremental, 204–205
Barriers, physical security, 195–196, 234
Basic Rate Interface (BRI), 118
Bastion host, 135
BCP (business continuity planning), 208–210, 234
Bell-LaPadula (B-L) access control model, 21, 52
Berkeley Internet Name Domain (BIND), 259–260
Biba access control model, 21–22
Binary code, 285
BIND (Berkeley Internet Name Domain), 259–260
Biometric authentication, 17, 22, 27–28, 53, 196
Birthday attacks, 36
Blowfish algorithm, 158
Boot infectors, 335, 352
Boot-sector viruses, 254
BO Trojan Horse, 340
Brain dumps, 10–11
Breaches, 17
BRI (Basic Rate Interface), 118
Bridges, 131–132
Brouters, 138
Brute force attacks, 35–36
Buffer overflows and buffer overflow attacks, 16, 36, 69, 90–91
Business and financial attacks, 307
Business continuity planning (BCP), 208–210, 234
Bus topology, 98–99
| < Free Open Study > |
|