Читаем CISSP Practice полностью

Border Gateway Protocol (BGP) flapping

A situation in which BGP sessions are repeatedly dropped and restarted, normally as a result of line or router problems.

Border Gateway Protocol (BGP) peer

A router running the BGP protocol that has an established BGP session active.

Border Gateway Protocol (BGP) session

A Transmission Control Protocol (TCP) session in which both ends are operating BGP and have successfully processed an OPEN message from the other end.

Border Gateway Protocol (BGP) speaker

Any router running the BGP protocol.

Border router

Border router is placed at the network perimeter. It can act as a basic firewall.

Botnet

Botnet is a jargon term for a collection of software robots, or bots, which run autonomously. A botnet’s originator can control the group remotely, usually through a means such as Internet relay chat (IRC), and usually for nefarious purposes. A botnet can comprise a collection of cracked machines running programs (usually referred to as worms, Trojan horses, or backdoors) under a common command and control infrastructure. Botnets are often used to send spam e-mails, launch DoS attacks, phishing attacks, and viruses.

Bound metadata

Metadata associated with a cryptographic key and protected by the cryptographic key management system against unauthorized modification and disclosure. It uses a binding operation that links two or more data elements such that the data elements cannot be modified or replaced without being detected.

Boundary

A physical or logical perimeter of a system.

Boundary protection

Monitoring and control of communications (1) at the external boundary between information systems completely under the management and control of the organization and information systems not completely under the management and control of the organization, and (2) at key internal boundaries between information systems completely under the management and control of the organization.

Boundary protection employs managed interfaces and boundary protection devices.

Boundary protection device

A device with appropriate mechanisms that (1) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (2) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. Boundary protection devices include such components as proxies, gateways, routers, firewalls, hardware/software guards, and encrypted tunnels.

Boundary router

A boundary router is located at the organization’s boundary to an external network. A boundary router is configured to be a packet filter firewall.

Boundary value analysis

The purpose of boundary value analysis is to detect and remove errors occurring at parameter limits or boundaries. Tests for an application program should cover the boundaries and extremes of the input classes.

Breach

The successful and repeatable defeat (circumvention) of security controls with or without detection or an arrest, which if carried to completion, could result in a penetration of the system. Examples of breaches are (1) operation of user code in master mode, (2) unauthorized acquisition of identification password or file access passwords, (3) accessing a file without using prescribed operating system mechanisms, and (4) unauthorized access to data/program library. Attack + Breach = Penetration.

Bridge

A device used to link two or more homogeneous local-area networks (LANs). A bridge does not change the contents of the frame being transmitted but acts as a relay. It is a device that connects similar LANs together to form an extended LAN. It is protocol-dependent. Bridges and switches are used to interconnect different LANs. A bridge operates in the data link layer of the ISO/OSI reference model.

Brokered trust

Describes the case where two entities do not have direct business agreements with each other, but do have agreements with one or more intermediaries so as to enable a business trust path to be constructed between the entities. The intermediary brokers operate as active entities, and are invoked dynamically via protocol facilities when new paths are to be established.

Brooke’s law

States that adding more people to a late project makes the project even more delayed.

Brouters

Routers that can also bridge, route one or more protocols, and bridge all other network traffic. Brouters = Routers + Bridges.

Browser

A client program used to interact on the World Wide Web (WWW).

Browser-based threats

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес