loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  (Next)
  ALL

B

BACnet

BACnet (Building Automation and Control Networks) is a communication protocol for building automation and control systems. It is used to enable communication between devices in HVAC, lighting, access control, and fire detection systems within smart buildings and ICS environments.

Bandwidth

The range of frequencies occupied by a signal, typically measured in Hz. Wider bandwidth often supports higher data rates but can be more complex to capture and process. Bandwidth affects receiver configuration, sampling rate, and storage requirements.

bcrypt

bcrypt is a password hashing function designed to be computationally expensive and resistant to brute-force attacks. It includes a built-in salt and a configurable cost factor that controls the work required to compute hashes.

Best Evidence Rule

A legal principle generally requiring the original or a reliable duplicate of a recording/document when proving content. In digital cases, forensic images, native exports, provider returns, and documented hashing can support “duplicate” reliability while preserving original evidence.

BIP (Bitcoin Improvement Proposal)

A formal proposal describing changes or additions to Bitcoin protocol or standards.

Black Market

One of the most well-known examples of illegal activity on the dark web is the existence of black markets. Black markets are online platforms where illegal goods and services can be bought and sold, often using cryptocurrency for anonymity.

One of the most famous black markets on the dark web was the Silk Road, which was launched in 2011 and shut down by the FBI in 2013. The Silk Road was a platform for the sale of illegal drugs, as well as other illicit items such as stolen credit card numbers and fake documents. The website was accessed through the Tor network and transactions were made using Bitcoin to maintain anonymity.

The Silk Road gained notoriety due to its size and the variety of illegal items available for purchase. It was estimated to have had over 100,000 users and millions of dollars in annual sales. The operator of the Silk Road, Ross Ulbricht, was eventually arrested and sentenced to life in prison for his role in the website.

While the Silk Road has been shut down, other black markets continue to operate on the dark web. These include the Evolution market, which was shut down in 2015, and the AlphaBay market, which was shut down in 2017. These markets offer a wide range of illegal goods and services, including drugs, weapons, and stolen personal information.

The existence of black markets on the dark web highlights the potential for illegal activity on this hidden part of the internet. While the dark web can be used for legitimate purposes, it is important for law enforcement agencies to monitor and shut down illegal operations such as black markets in order to maintain the rule of law.



Block

A bundle of validated transactions added to the blockchain ledger in chronological order.

Block Cipher

A cipher that encrypts data in fixed-size blocks (such as 128-bit blocks for AES). Block ciphers are used with modes of operation to securely encrypt messages of arbitrary length.

Block Explorer

A web or software tool used to view blocks, transactions, addresses, and related metadata on a blockchain.

Block Hash

The cryptographic hash that uniquely identifies a block and is derived from the block header contents.


Page:  1  2  3  (Next)
  ALL