fail safe
A fail safe is the automatic protection of programs and/or processing systems when hardware or software failure is detected.
Fail soft
Fail soft is the elective termination of affected nonessential processing when hardware or software failure is determined to be imminent.
Failover
Failover is a system’s capability to switch over automatically without any warning or human intervention to a redundant or standby information system upon the failure or abnormal termination of the previously active system.
False positive
A false positive is an alert that incorrectly indicates that malicious activity is occurring.
Federal information system
The federal information system is an information system used or operated by an executive agency, a contractor of an executive agency, or by another organization on behalf of an executive agency.
Federal public key infrastructure policy authority fpki pa
The federal pki policy authority is a federal government body responsible for setting, implementing, and administering policy decisions regarding interagency pki interoperability that uses the fbca.
File encryption
File encryption is the process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.
Filename anomaly
File name anomaly is a mismatch between the internal file header and its external extension. A file name anomaly is also a file name inconsistent with the content of the file (e.g., renaming a graphics file with a non-graphical extension).
File protection
File protection is the aggregate of processes and procedures designed to inhibit unauthorized access, contamination, elimination, modification, or destruction of a file or any of its contents.
File security
File security is the method in which access to computer files is limited to authorized users only.
File transfer protocol ftp
File transfer protocol (ftp) is an internet protocol for transferring files from one computer to another in a network using tcp/ ip.
Fill device
A fill device is a comsec item used to transfer or store keys in electronic form or to insert key into cryptographic equipment.
Firewall control proxy
A firewall control proxy is the component that controls a firewall’s handling of a call. The firewall control proxy can instruct the firewall to open specific ports that are needed by a call, and direct the firewall to close these ports at call termination.
Firewall
A firewall is a security system tool that includes any software or hardware aimed at preventing viruses, worms, and hackers from intruding into a system or network.
Firmware
Firmware consists of the programs and data components of a cryptographic module that are stored in hardware within the cryptographic boundary and cannot be dynamically written or modified during execution.
Flaw hypothesis methodology
Flaw hypothesis methodology is the system analysis and penetration technique in which the specification and documentation for an information system are analyzed to produce a list of hypothetical flaws. This list is prioritized on the basis of the estimated probability that a flaw exists, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to perform penetration testing of a system.
Flooding
Flooding is an attack that attempts to cause a failure in a system by providing more input than the system can process properly.
Focused testing
Focused testing is a test methodology that assumes some knowledge of the internal structure and implementation detail of the assessment object. Focused testing is also known as gray box testing.
Forensic copy
Forensic copy is an accurate bit-for-bit reproduction of the information contained on an electronic device or associated media, whose validity and integrity has been verified using an accepted algorithm.
Forensic examination
Forensic examination is the investigation to evaluate, analyze, organize, preserve, and document evidence, including digital evidence that helps identify the cause of an incident.
Forensic specialist
A forensic specialist is a professional who locates, identifies, collects, analyzes, and examines data while preserving the integrity and maintaining a strict chain of custody of information discovered.
Forensically clean
Forensically clean describes digital media that is completely wiped of all data, including nonessential and residual data, scanned for malware, and verified before use.
Forensics
Forensics is the practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.
Forward cipher
A forward cipher is one of the two functions of the block cipher algorithm that is determined by the choice of a cryptographic key. The term “forward cipher operation” is used for tdea, while the term “forward transformation” is used for dea.
Freeware
Freeware is an application, program, or software available for use at no cost.
Full disk encryption fde
Full disk encryption is the process of encrypting all the data on the hard disk drive used to boot a computer, including the computer’s operating system, and permitting access to the data only after successful authentication with the full disk encryption product.