INVITATION TO CYBERSECURITY 296 Biba model: a rule for managing access to information primarily concerned with the integrity of information based on the low water mark principle (8) bigram: a pair of letters (7) Bill of Rights: the first ten amendments to the United States Constitution that protect the rights of citizens from the government (10) binary: a base two number system that uses the symbols 1 and 0 (2) biometric authentication: a method for authenticating a person based on physical characteristics (8) birthday paradox: only twenty-three people are required to make it probable that any two people will have the same birthday (7) bit: binary digit (1 or 0) (2) Bitcoin: a cryptocurrency that is built on a blockchain (7) Bitlocker: Microsoft Windows built-in encryption utility (9) Black Hat: a major hacking conference held every summer in Las Vegas focused on industry and vendors (3) black hat hackers: are individuals who engage in illegal hacking (3) black market: a marketplace for stolen and illegal goods (5) blacklist: a list of explicitly denied resources (8) bloatware: a pejorative term for applications that come pre-installed on devices (9) block: a block size number of consecutive bits that are grouped and processed together in a block cipher cryptosystem (7) block chaining: a technique used in block cipher cryptosystems that incorporates the previous encrypted block into the next block to obscure the relationship between plaintext blocks (7) block cipher: a cryptographic system that encrypts and decrypts a block of bits at a time (7) block size: the number of bits grouped together in a block in a block cipher cryptosystem (7) blockchain: a technology used to create a trusted public record in a low-trust environment (7) blue team: the defenders in a CTF (3) Boole, George: the founder of binary logic (2) Boolean logic: a system that accepts true and false inputs and produces a true or false output (2) booting: loading an operating system into memory when computers are powered on (2) bot: a pwned computer that can be remotely controlled (3) botnet: a collection of bots that can remotely controlled as a group by a hacker (3)
RkJQdWJsaXNoZXIy MTM4ODY=