top of page

Cyber Terminologies and Fundamentals

Definitions 

Black Hat Hacker

A hacker who engages in illegal or unethical cyber activities, such as data breaches or fraud.

Buffer Overflow

A vulnerability where excess data overwrites adjacent memory, potentially leading to system crashes or exploits.

Brute Force Attack

A hacking method that systematically attempts multiple password combinations to gain unauthorized access.

Blockchain Security

Techniques and measures to protect blockchain networks from fraud, attacks, and vulnerabilities.

Backup and Recovery

Processes for creating and restoring copies of data to prevent loss due to cyber incidents.

Bug Bounty

A program where ethical hackers are rewarded for identifying and reporting security vulnerabilities.

Blue Team

A cybersecurity team responsible for defending an organization's network and detecting threats.

Botnet

A network of compromised devices controlled by an attacker to carry out large-scale cyberattacks.

Business Email Compromise (BEC)

A type of fraud where attackers impersonate business executives to manipulate employees or clients.

Browser Fingerprinting

A technique used to identify and track users based on unique browser settings and behaviors.

BGP Hijacking

An attack where hackers manipulate Border Gateway Protocol (BGP) routes to redirect internet traffic.

Bootloader Security

Security measures designed to protect a system’s bootloader from unauthorized modifications.

Binary Exploitation

Techniques used to exploit vulnerabilities in compiled software binaries.

Behavior-Based Detection

A security approach that detects malware based on behavioral analysis rather than signatures.

Bastion Host

A highly secured server designed to withstand attacks and serve as a gateway to a private network.

BIOS Security

Techniques to protect a system’s Basic Input/Output System (BIOS) from tampering or malware.

Bluetooth Security

Security practices to protect Bluetooth devices from eavesdropping, hijacking, or unauthorized access.

Bank Trojan

A type of malware designed to steal banking credentials and financial information.

Beaconing

A method used by malware to communicate with an attacker-controlled server for command execution.

Burp Suite

A popular cybersecurity tool used for web application security testing and penetration testing.

bottom of page