Glossary
Term | Description |
---|---|
False acceptance rate (FAR) |
Error that occurs when a biometric device is not sensitive enough and an invalid subject is authenticated. Also referred to as a Type 2 error. The percentage of imposters incorrectly matched to a valid user’s biometric. False rejection rate (FRR) is the percentage of incorrectly rejected valid users.
|
Fault |
(1) A defect that results in an incorrect step, process, data value, or mode/state. (2) A weakness of the system that allows circumventing protective controls. 1) A momentary loss of power. 2) A failure or problem within a system, device, or process.
|
Fault Tolerance |
Builtin capability of a system to provide continued correct execution in the presence of a limited number of hardware or software faults. The ability of a system to suffer a fault but continue to operate. Fault tolerance is achieved by adding redundant components such as additional disks within a redundant array of independent disks (RAID) or additional servers within a failover clustered configuration.
|
FCS |
Cryptographic support functional class. Frame check sequence.
|
Fiber Distributed Data Interface (FDDI) |
A high-speed token-passing technology that employs two rings with traffic flowing in opposite directions. FDDI offers transmission rates of 100 Mbps and is often used as a backbone to large enterprise networks. LAN standard, defined by ANSI X3T9. 5, specifying a 100Mbps tokenpassing network using fiberoptic cable, with transmission distances of up to two kilometers. FDDI uses a dualring architecture to provide redundancy.
|
Field |
A basic unit of data, usually part of a record that is located on an input, storage, or output microfilm. In a database, a field is a column or attribute of a table.
|
File protection |
Aggregate of processes and procedures designed to inhibit unauthorized access, contamination, elimination, modification, or destruction of a file or any of its contents. The aggregate of all processes and procedures established in a computer system and designed to inhibit unauthorized access, contamination, or elimination of a file.
|
Firewall |
A device that forms a barrier between a secure and an open environment. Usually the open environment is considered hostile. The most notable open system s the Internet. A network device used to filter traffic. A firewall is typically deployed between a private network and a link to the Internet, but it can be deployed between departments within an organization. Firewalls filter traffic based on a defined set of rules. System designed to defend against unauthorized access to or from a private network.
|
Firmware |
Program recorded in permanent or semipermanent computer memory. Software or computer instructions that have been permanently encoded into the circuits of semiconductor chips. Software that is stored in a ROM chip.
|
Flooding |
An attack that involves sending enough traffic to a victim to cause a DoS. Also referred to as a stream attack. Type of incident involving insertion of a large volume of data resulting in denial of service.
|