Glossary
Term Description
False acceptance rate (FAR)
Error that occurs when a biometric device is not sensitive enough and an invalid subject is authenticated. Also referred to as a Type 2 error. The percentage of imposters incorrectly matched to a valid user’s biometric. False rejection rate (FRR) is the percentage of incorrectly rejected valid users.
Fault
(1) A defect that results in an incorrect step, process, data value, or mode/state. (2) A weakness of the system that allows circumventing protective controls. 1) A momentary loss of power. 2) A failure or problem within a system, device, or process.
Fault Tolerance
Builtin capability of a system to provide continued correct execution in the presence of a limited number of hardware or software faults. The ability of a system to suffer a fault but continue to operate. Fault tolerance is achieved by adding redundant components such as additional disks within a redundant array of independent disks (RAID) or additional servers within a failover clustered configuration.
FCS
Cryptographic support functional class. Frame check sequence.
Fiber Distributed Data Interface (FDDI)
A high-speed token-passing technology that employs two rings with traffic flowing in opposite directions. FDDI offers transmission rates of 100 Mbps and is often used as a backbone to large enterprise networks. LAN standard, defined by ANSI X3T9. 5, specifying a 100Mbps tokenpassing network using fiberoptic cable, with transmission distances of up to two kilometers. FDDI uses a dualring architecture to provide redundancy.
Field
A basic unit of data, usually part of a record that is located on an input, storage, or output microfilm. In a database, a field is a column or attribute of a table.
File protection
Aggregate of processes and procedures designed to inhibit unauthorized access, contamination, elimination, modification, or destruction of a file or any of its contents. The aggregate of all processes and procedures established in a computer system and designed to inhibit unauthorized access, contamination, or elimination of a file.
Firewall
A device that forms a barrier between a secure and an open environment. Usually the open environment is considered hostile. The most notable open system s the Internet. A network device used to filter traffic. A firewall is typically deployed between a private network and a link to the Internet, but it can be deployed between departments within an organization. Firewalls filter traffic based on a defined set of rules. System designed to defend against unauthorized access to or from a private network.
Firmware
Program recorded in permanent or semipermanent computer memory. Software or computer instructions that have been permanently encoded into the circuits of semiconductor chips. Software that is stored in a ROM chip.
Flooding
An attack that involves sending enough traffic to a victim to cause a DoS. Also referred to as a stream attack. Type of incident involving insertion of a large volume of data resulting in denial of service.