Skip to Main Content
Apply
Quicklinks
Search
A-Z Index
BengalWeb
Campus Map
Directory
Email
Events
Library
Moodle
News
Give
Admissions
Students
Faculty & Staff
Parents
Alumni & Visitors
Academic Calendar
Academic Catalogs
Administration
Advising
Athletics
Campus Security
Career Center
Class Schedule
Colleges & Departments
Financial Aid
Health & Wellness
Housing
Human Resources
Jobs
Museum of Natural History
Parking
Registrar
Scholarships
Transcripts
Tuition
Majors
Cost
Visit
Parking
Map
Apply
Give
Search
Common Searches
BengalWeb
Bookstore
Academic Calendar
Directory
COVID-19
Jobs
Human Resources
Moodle
Calendar
Tuition
JavaScriptMessages
Security Site
Security At ISU
News
Rss Feeds
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
B
B
B Channel
B1
B1FF*
B2
B3
Back Door
Backbone Site*
Backdoor
Backdoor account
Backdoor Trojan
Backgammon*
Background checks
Background Investigations #
Background Processing
Background*
Backspace And Overstrike*
Back-To-Back Connection
Backup
Backup console
Backup facility
Backup File
Backup Plan
Backup Procedures
Backup retention plan
Backups#
Backward Channel
Backward Combatability*
Backward Recovery
Bacterium
Bad Thing*
BAD*
Balanced Code
Banana Label*
Band
Bandwidth
Bandwidth Compression
Bang
Bang On*
Bang Path*
Banner
Banner*
Bar Code
Bare Metal*
Baroque*
Base
Base Address
Base C4 Systems Security Office
Base Computer Systems Security Officer
Baseband
Baseline
Baselines
Basic Software
Basic Software (nonfunctional)
Basic Status
BASIC*
Basic/Generic Management Issues#
Bastion host
Batch mode
Batch Processing
Batch scripts
Batch*
Baterium
Bathtub Curve*
Baud
Baud Rate
Baudot Code
Bboard*
BBS
BCC
BCD
BCI
BCSSO
Bd
Beam*
Beanie Key*
Bearer Channel
Bearer Service
Beep*
Behavioral scanning
Bell-La Padula
Bell-La Padula Security Model
Bell-LaPadula Model
Bells And Whistles*
Benign
Benign Environment
Benign payload
BER
BERT
Best practices
Beta*
Between-The-Lines Entry
Beyond A1
Bible*
BiCapitalization*
Biff*
Big Gray Wall*
Big Iron*
Big Red Switch*
Big Room, The*
Big Win*
Big-Endian*
Bignum*
Bigot*
Binary
Binary Code
Binary Digit
Binary Element
Binary Exponential Backoff
Binary Notation
Binary Synchronous Communication
Binary-Coded Decimal
Binary-Coded Decimal Code
Binary-Coded Decimal Interchange Code
Binary-Coded Decimal Notation
Binary-Coded Decimal Representation
Binding
Binding/Handshaking#
Biometric
Biometric authentication
Biometrics#
BIOS password
B-ISDN
Bi-Sync
Bit
Bit Bang*
Bit Bashing*
Bit Bucket*
Bit Configuration
Bit Decay*
Bit Density
Bit Error Rate
Bit Error Ratio
Bit Error Ratio Tester
Bit Interval
Bit Inversion
Bit Pairing
Bit Position
Bit Rate
Bit Robbing
Bit Rot*
Bit Slip
Bit Stream Transmission
Bit String
Bit Synchronization
Bit Twiddling*
Bitblt*
Bit-By-Bit Asynchronous Operation
Bit-Count Integrity
BITNET*
Bit-Paired Keyboard*
Bits Per Inch
Bits Per Second
Bits*
Bit-Sequence Independence
Bit-Stepped
Bit-Synchronous Operation
BIU
Bixie*
Black
Black Art*
BLACK Equipment Area (BEA)
Black hat hackers
Black hole
Black Hole*
Black Key
BLACK Line
BLACK Signal
Blanking
Blast*
Blended threats
Blink*
Blinkenlights*
Blinking
Blit*
Blitter*
Blivet*
BLOB*
Block
Block Character
Block Check
Block Check Character
Block Code
Block Diagram
Block encryption
Block Length
Block Parity
Block Transfer
Block Transfer Attempt
Block Transfer Computations*
Block Transfer Efficiency
Block Transfer Failure
Block Transfer Rate
Block Transfer Time
Block-Error Probability
Blocking
Blocking Criterion
Blocking Factor
Blocking Formulas
Block-Loss Probability
Block-Misdelivery Probability
Blow An EPROM*
Blow Away*
Blow Out*
Blow Past*
Blow Up*
BLT*
Blue Book*
Body
Border firewalls
Bourne Shell and Bourne Again Shell (BASH)
BPI
BPOC
BPS
BQS*
BR
Breach
Bridge
Broken Arrow*
Broken*
Broket*
Brooks's Law*
Browsing
BRS*
Brute Force And Ignorance*
Brute Force*
Brute-force guessing
BSA
BSD*
BSE
Bubble Sort*
Bucky Bits*
Budget
Budget And Accounting Act
Budget And Accounting Procedures Act Of 1950
Buffer
Buffer overflow
Buffer Overflow*
Bug
Bugging
Bulk Encryption
Bulletproof*
Bum*
Bump*
Burble*
Buried Treasure*
Burn-In Period*
Burst Page*
Burst Transmission#
Bus
Bus Interface Unit
Bus Topology
Business Aspects Of Information Security#
Business champions
Business continuity plan
Business process analysis
Busy Back
Busy-Wait*
Buzz*
BW
BWQ*
By Hand*
Byte
Buffer Overflow*
n. What happens when you try to stuff more data into a buffer (holding area) than it can handle. This may be due to a mismatch in the processing rates of the producing and consuming processes (see overrun and firehose syndrome), or because the buffer is simply too small to hold all the data that must accumulate before a piece of it can be processed. For example, in a text-processing tool that crunches a line at a time, a short line buffer can result in lossage as input from a long line overflows the buffer and trashes data beyond it. Good defensive programming would check for overflow on each character and stop accepting data when the buffer is full up. The term is used of and by humans in a metaphorical sense. "What time did I agree to meet you? My buffer must have overflowed. " Or "If I answer that phone my buffer is going to overflow. " See also spam.