0-9   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

BACKUP SCHEDULE

Allows backups to occur automatically at a designated time on set days of the week.


BACKUP WINDOW

The time period available or allotted for backing up data. 


BACKUP/RESTORE

A two-step process. Data is first backed up to a secondary storage device i.e. external media such as hard drive, tape, DVD or backed up remotely (Online Storage). In the event of computer problems (such as disk drive failures, power outages, or virus infection) resulting in data loss or damage to the original data, the backed up data is then retrieved and restored to a functional system.


BACKWARD COMPATIBLE

Software or hardware designed to be compatible with earlier versions of the same product.


BARE-METAL RESTORE

Bare-metal restore is a form of data recovery which allows users to restore a system from “bare metal”, i.e. without any requirements as to previously installed software or operating system.


behavior monitoring

Observing activities of users, information systems, and processes and measuring the activities against organizational policies and rule, baselines of normal activity, thresholds, and trends.
Adapted from: DHS personnel
behavioral monitoring  
Synonym(s): behavior monitoring


BLOCK DATA

Raw data which does not have a file structure imposed on it. Database applications such as Microsoft SQL Server and Microsoft Exchange Server transfer data in blocks. Block transfer is the most efficient way to write to disk.


Blocklist

 A list of entities that are blocked or denied privileges or access.
Related Term(s): Allowlist
Adapted from: DHS personnel


Blue Team

A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team).
Extended Definition: Also, a group that conducts operational vulnerability evaluations and recommends mitigation techniques to customers who need an independent technical review of their cybersecurity posture.
Related Term(s): Red Team, White Team
Adapted from: CNSSI 4009


bot

A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
Extended Definition: A member of a larger collection of compromised computers known as a botnet.
Synonym(s): zombie
Related Term(s): botnet



Display #