Back door - Hidden software or hardware mechanism used to bypass security controls.
Bandwidth - Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time. usually expressed in bits per second.
Banner - A banner is the information that is displayed to a remote user trying to connect to a service. This may include version information, system information, or a warning about authorized.
Basic Authentication - Basic Authentication is the simplest web-based authentication scheme that works by sending the user name and password with each request.
Bastion Host - A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.
BitTorrent - A peer-to-peer file-sharing protocol used to distribute large amounts of data.
Black hat hacker - A hacker with malicious intent.
Border Gateway Protocol (BGP) - An inter-autonomous system routing protocol. BGP is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP).
Bot - An automated software program that can execute certain commands when it receives specific input.
Botnet - A network of infected/compromised computers used to perpetrate cyber crime.
Bridge - A product that connects a local area network (LAN) to another local area network that uses the same protocol
Brute Force - A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
Buffer Overflow - A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.
Bug - An error or flaw in a computer program that prevents it from operating as intended.
Business Continuity Plan (BCP) - A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.
Business Impact Analysis (BIA) - A Business Impact Analysis determines what levels of impact to a system are tolerable.