Glossary For Access Control

Service Img

Bridge : A product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or token ring).

British Standard 7799 : A standard code of practice and provides guidance on how to secure an information system. It includes the management framework, objectives, and control requirements for information security management systems.

Broadcast :
To simultaneously send the same message to multiple recipients. One host to all hosts on network.

Broadcast Address : An address used to broadcast a datagram to all hosts on a given network using UDP or ICMP protocol.

Browser : A client computer program that can retrieve and display information from servers on the World Wide Web.

Brute Force : A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.

Buffer Overflow : A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.

Business Continuity Plan (BCP) : A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.

Business Impact Analysis (BIA) : A Business Impact Analysis determines what levels of impact to a system are tolerable.

Byte : A fundamental unit of computer storage; the smallest addressable unit in a computer's architecture. Usually holds one character of information and usually means eight bits.

Badge : Badging Use of a card for identification purposes. Cards used to unlock doors may sometimes be printed to serve also as I D. badges.

Battery standby : A means of automatically switching over to stored battery power during local primary power failure.

Biometrics : The measurement of a physical trait that is unique, such as a fingerprint, hand geometry or iris pattern. In access control this is used to identify authorized users and to grant or deny access.

Break : To open an electrical circuit.

Brownout Low line voltage that can cause misoperation of and possible damage to equipment. For example a motor that tries to start at low voltage can actually be in a lock-rotor condition and can overheat.

Creating Simplicity out of Complexity