Information Security Definitions

Browse Definitions
Search Definitions
  • F

    false rejection (type I error)

    False rejection, also called a type I error, is a mistake occasionally made by biometric security systems.

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats.

  • federated identity management (FIM)

    Federated Identity Management (FIM) is an arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group... (Continued)

  • FERPA (Family Educational Rights and Privacy Act of 1974)

    FERPA (Family Educational Rights and Privacy Act of 1974) is legislation that protects the privacy of students' personally identifiable information (PII). The act applies to all educational institutions that receive federal funds.

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of security specifications for strong authentication. Unlike password databases, FIDO stores authentication data locally on the user device.

  • finger vein ID

    Finger vein ID is a biometric authentication system that matches the vascular pattern in an individual's finger to previously obtained data...(continued)

  • fingernail storage

    Fingernail storage is a method of writing data onto a human fingernail using a pulsed laser. The fluorescence of the nail, when exposed to ultraviolet (UV) light, is increased at points where data is written. Data can be read from the fingernail using a microscope while irradiating the nail with UV energy.

  • fingerscanning (fingerprint scanning)

    Fingerscanning, also called fingerprint scanning, is the process of electronically obtaining and storing human fingerprints.

  • firewall

    A firewall is a network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.

  • Firewall Builder (Fwbuilder)

    Firewall Builder, also called Fwbuilder, is a vendor-neutral configuration and management application for firewalls that is intended primarily for Linux and that supports the OpenBSD Packet Filter, Cisco PIX Series security devices, iptables, and ipfilter.

  • footprinting

    In the study of DNA, footprinting is the method used to identify the nucleic acid sequence that binds with proteins.

  • Fortezza

    Fortezza, Italian for "fortress," is a family of security products trademarked by the US government's National Security Agency.

  • four-factor authentication (4FA)

    Four-factor authentication (4FA) is the use of four types of identity-confirming credentials, typically categorized as knowledge, possession, inherence and location factors.

  • FRCP Rule 41

    FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

  • fuzz testing (fuzzing)

    Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close