backdoors, installed by unsigned code backing up CA (certificate authority) certificates and private keys baseline configuration for computers baselining DHCP traffic Basic authentication 2nd best practices for physical security for software restrictions biometrics vs. passwords blocking ports as security measure blocking/overriding capabilities of GPOs boundary security brute force attacks on passwords bucket brigade attacks built-in security templates