Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] B1, TCSEC class 2nd B2, TCSEC class 2nd B3, TCSEC class 2nd Backdoors [See Trapdoors.] Backing up data Balanced scorecard Base registers Baseline Bastion host Beacon gif [See Web bugs.] Beizer. Boris BellLa Padula security model Beneficiaries of security policies Benign viruses Best practices 2nd BestBuy Biba integrity security model BIND (Berkeley Internet Name Domain) Binding of functionality Biometrics 2nd [See also Face recognition authentication.] "Black hole" failure Black-box testing Blaze, Matt Block ciphers [See also AES (Advanced Encryption System); DES (Data Encryption Standard).] Bombs, software [See Logic bombs; Time bombs.] Book ciphers Boot sector viruses Bootstrapping Botnets Bots Boundaries, network Boundary condition errors Bounds disclosure Bounds registers Brain virus Breakable encryption Breaking encryption [See also Cryptanalysis.] chosen plaintext attacks ciphertext only attacks full plaintext attacks partial plaintext attacks probable plaintext attacks weaknesses Britain [See United Kingdom.] British evaluation criteria Broadcast mode Brute force attack 2nd Buffer overflow 2nd Bugs software web 2nd Bulletin boards Business case adjusting future earnings balanced scorecard cost estimates definition determining economic value discount rate false positives influences on investment strategy IRR (internal rate of return) net present value opportunity cost overview ROI (return on investment) web application, case study Business continuity plan Byte substitution |