Archives: Glossary

Business continuity

Definition: developing strategies and process to ensure that an organisation can continue operating, or quickly recover, in the event of unexpected disruptions such as cyber-attacks.
Read more

Brute force

Definition: a hacking technique where an attacker attempts to gain access to a system or account by trying many possible combinations of passwords until the correct one is found.
Read more

Bring-your-own-device (BYOD)

Definition: the practice of allowing employees to use their own computer devices for work purposes. This may be cost-effective, but comes with new cyber security considerations to be made.
Read more

Breach

Definition: an incident in which data, computer systems or networks are accessed or affected resulting in a compromise on the confidentiality, integrity or availability of information or data.
Read more

Botnet

Definition: a network of compromised devices (referred to as bots) that are controlled by a single malicious actor. These botnets can be used for cybercrime such as launching distributed denial-of-service [...]
Read more

Blue team

Definition: in a simulated cyber-attack, the blue team are responsible for defending the systems. Larger organisations will often organise their cyber security teams into Blue and Red teams.
Read more

Black hat

Definition: hackers who have malicious or criminal intent.
Read more

Black box testing

Definition: penetration testing where an ethical hacker has no knowledge of the system they are attacking. This simulates an attempted hack that comes from outside of an organisation.
Read more

Allowlist

Definition: authorised applications for use within organisations. Also referred to as a whitelist.
Read more