АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Backchannel authenticationBackchannel authentication endpointBackdoorBackdoorsBackupBalanced sequenceBase metrics of vulnerabilityBase vector of vulnerabilityBaseline controlBasic block cipherBasic block encryption algorithmBasic strength of functionBattery of testsBearer tokenBiasBiasBinary keyBinary keyBiometric algorithmBiometric authenticationBiometric behavioral dataBiometric dataBiometric featureBiometric feature data unitBiometric feature extractionBiometric image dataBiometric informationBiometric sampleBiometric systemBiometric templateBiometric typeBiometric verificationBiometric verification dataBirthday attackBit commitment protocol (scheme)Black box assumptionBlack-boxBlacklistingBlind digital signatureBlind signature schemeBlockBlock cipherBlock cipher mode of operationBlock ciphering systemBlockchainBlockchain tokenBoot virusBootkitBotBotnetBreach and attack simulation (BAS)Breaking a cryptosystem (cryptographic mechanism)Breaking of cryptosystem, breaking an enciphering systemBring your own device (BYOD)Browser hijackingBrute-force attackBugBugBug bountyBuild-in cryptographic mechanismsBusiness continuity management (BCM)