Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

BaaS

BaaS, short for Backend-as-a-Service, allows developers to focus on the frontend of their applications and leverage backend services without building or maintaining them.

Backdoor

In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Once they're in, cybercriminals can use a backdoor to steal personal and financial data, install additional malware, and hijack devices. Backdoors are known for being discreet and attacks can often go undetected, resulting in them being used over and over again.

BAI

BAI, or BAI file format, is a file format for performing electronic cash management balance reporting. It was developed and previously maintained by the Bank Administration Institute (BAI). BAI does not separate out the incoming check line items by invoice subtotal reference.

BAI2

BAI2 is a banking EDI format. It is a specialized and standardized set of codes used for cash management by the Bank Administration Institute (BAI). BAI2 splits the check total into separate invoice references and assoicated payment amounts.

Bank Administration Institute (BAI)

The Bank Administration Institute is a non-profit organization in the US that provides training, research, and leadership events for the finance industry.

Batch File

A type of script that contains a list of commands. These commands are executed in sequence and can be used to automate processes.

Blockchain

A ledger or chain of information that retails a detailed history of digital transactions. They are meant to help protect against counterfeiting and to safeguard digital transactions.

Bot

A computer or system that has been compromised and is undetected. The computer can be controlled directly by a bot master or herder for the purpose of spamming or launching a DDoS attack. It may also have been programmed to perform certain actions when interfacing with human input or websites.

Box

A cloud content management and file sharing service for businesses. It is available as a GoAnywhere Cloud Connector.