A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.
An inter-autonomous system routing protocol. BGP is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP).
A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack.
A mechanism (software or hardware) which connect two communication segments. Bridges generally operate at OSI Layer 2 or 3, but may operate from the physical layer up to the application layer. Some examples of bridging technologies: serial bridge (bridge multiple RS485 bus); wireless access bridge (bridge a wireless segment and a wired segment); Ethernet software bridge (OS level network interface bridging)
A standard code of practice and provides guidance on how to secure an information system. It includes the management framework, objectives, and control requirements for information security management systems.
To send the same message to an unknown number of destinations without addressing. Examples: ARP, Radio. See also multicast.
An address used to broadcast a datagram to all hosts on a given network using UDP or ICMP protocol.