B


[B]

Back Door

A hole in the security of a computer system deliberately left in place by designers or maintainers. Synonymous with trap door. A hidden software or hardware mechanism used to circumvent security controls.

Bell-La Padula Security Model

Formal-state transition model of computer security policy that describes a formal set of access controls based on information sensitivity and subject authorizations.

Biba Integrity Model

A formal security model for the integrity of subjects and objects in a system.

Bomb

A general synonym for crash, normally of software or operating system failures.

Breach

The successful defeat of security controls, which could result in a penetration of the system. A violation of controls of a particular information system such that information assets or system components are unduly exposed.

Buffer Overflow

This happens when more data is put into a buffer or holding area than the buffer can handle. This is due to a mismatch in processing rates between the producing and consuming processes. This can result in system crashes or the creation of a back door leading to system access.

Bug

An unwanted and unintended property of a program or piece of hardware, especially one that causes it to malfunction.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net