ICTN 6823 Final Review (f)
fault
A short-term interruption in electrical power availability.
firewall
In information security, a combination of hardware and soft- ware that filters or prevents specific information from moving between the outside network and the inside network.
framework
In information security, a specification of a model to be followed during the design, selection, and initial and ongoing imple- mentation of all subsequent security controls, including InfoSec poli- cies, security education and training programs, and technological controls. Also known as a security model.
footprint
In wireless networking, the geographic area in which there is sufficient signal strength to make a network connection.
full-interruption testing
The CP testing strategy in which all team members follow each IR/DR/ BC procedure, including those for inter- ruption of service, restoration of data from backups, and notification of appropriate individuals.
forensics
The coherent application of methodical investigatory tech- niques to present evidence of crimes in a court or court-like setting.
footprinting
The organized research and investigation of Internet addresses owned or controlled by a target organization.
false reject rate
The rate at which authentic users are denied or prevented access to authorized areas as a result of a failure in the biometric device. This failure is also known as a Type I error or a false negative.
false accept rate
The rate at which fraudulent users or nonusers are allowed access to systems or areas as a result of a failure in the bio- metric device. This failure is also known as a Type II error or a false positive.
fingerprinting
The systematic survey of a targeted organization's Internet addresses collected during the foot printing phase to identify the network services offered by the hosts in that range.
Forensics
allows investigators to determine what happened by exam- ining the results of an event—criminal, natural, intentional, or accidental.