An alternate access to a secure system, either without an account or from an account that is usually restricted. Backdoor can also be used to send a certain packet to a secure server network port
A bastion host is a gateway between an inside network and an outside network. Used as a security measure, the bastion host is designed to defend against attacks aimed at the inside network. Depending on a network's complexity and configuration, a single bastion host may stand guard by itself, or be part of a larger Computer Security system with different layers of protection.
A unique and measurable characteristic of a human being used to authenticate and identify an individual. A key characteristic of a biometric access system is that it must operate in real-time. An example could be a fingerprint scanner, which scans the fingerprint and compares the results instantly to a stored database of acceptable fingerprints. Other characteristics include retina scans and voice recognition.
Brain is the first internet security virus, most certainly written in the ms-dos computing environment which became widespread among ordinary computer users.
British Standard 7799 (BS7799)
BS7799 is the British standard for Information Security Management. It has now become an International Standard, ISO 17799. It is in two parts - Part 1 sets out approximately 40 objectives for Information Security, and Part 2 has about 130 controls which can be implemented to achieve those objectives.
An attack where all possible options are used at one time, often in a programmed sequence that attempts to use all possible passwords to break into password protected websites. Brute force can also be used to attack PKI services that use low encryption (40-56 bit) SSL Certificates by trying all possible key combinations.
A Bug is a problem that causes a program to crash or produce invalid output.