Index for glossary B
A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.
Use of measurable physiological characteristics to authenticate a user such as fingerprints or facial characteristics.
A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a distributed denial of service attack.
Brute Force Attack
Brute force attack is a technique used to break an encryption or authentication system by trying all possibilities.
An attack exploits a process to read in data beyond the boundary of a fixed-length buffer, with an aim to overwrite computer memory by a carefully crafted data and execute privilege instructions in an unintended way.