All > Technology > Security
A copy of files and programs made to facilitate recovery if necessary.
- Browse Related Terms: agent, Backup, Boot Sector Virus, Computer Virus, Deleted File, Easter Egg, Exploit Code, File Infector Virus, handler, Macro Virus, malicious code, Mobile Code, Mobile Software Agent, Port Scanning, System Software, Trojan horse, Virus, Worm, Zombie
Also listed in:
- All > Law > E-Discovery
- All > Technology > GIS
- All > Technology > Records Management
- All > Technology > Telecommunications
All > Technology > Security
The minimum security controls required for safeguarding an IT system based on its identified needs for confidentiality, integrity and/or availability protection.
- Browse Related Terms: assurance, Baseline Security, Cybersecurity, High Impact System, Incident, Information Assurance, Information Security, IT Security Goal, IT Security Metrics, Low Impact System, Malware, Moderate Impact System, Naming Authority, Potential Impact, Safeguards, Security Category, Security Controls, Security Goals, Security Objective, Security Requirements, sensitivity, Trustworthy System
All > Technology > Security
Monitoring resources to determine typical utilization patterns so that significant deviations can be detected.
- Browse Related Terms: access, application, Baselining, chain of custody, Computer Security Object (CSO), Computer Security Objects Register, Control Information, Denial of Service (DoS), Information Resources, information system, Metrics, records, security label, System, System Interconnection
All > Technology > Security
A bastion host is typically a firewall implemented on top of an operating system that has been specially configured and hardened to be resistant to attack.
- Browse Related Terms: Bastion Host, Boundary Protection, Computer Security Incident Response Team (CSIRT), Firewall Control Proxy, Firewall Environment, Firewall Platform, Firewall Ruleset, Guard (System), IDS, Incident Response Plan, Intrusion Prevention Systems, IT Security Architecture, Media, Proxy Agent, security perimeter
Also listed in:
All > Technology > Security > Biometrics
A biometric characteristic that is learned and acquired over time rather than one based primarily on biology. All biometric characteristics depend somewhat upon both behavioral and biological characteristic. Examples of biometric modalities for which behavioral characteristics may dominate include signature recognition and keystroke dynamics. See also biological biometric characteristic.
- Browse Related Terms: Behavioral Biometric Characteristic, Biological Biometric Characteristic, Biometrics, Face Recognition, Gait, Hand Geometry Recognition, Iris Recognition, Keystroke Dynamics, Palm Print Recognition, Signature Dynamics, Speaker Recognition
All > Technology > Security
What an individual who has completed the specific training module is expected to be able to accomplish in terms of IT security-related job performance.
- Browse Related Terms: Behavioral Outcome, Cryptographic Module Security Policy, Cryptographic Strength, Profiling, Security Assertion Markup Language (SAML), Subsystem, Training Assessment, Training Effectiveness
All > Technology > Security > Biometrics
The process of comparing measured performance against a standard, openly available, reference.
Also listed in:
- All > Technology > Records Management
- All > Technology > Search > Enterprise Search
- All > Travel > Tourism
All > Technology > Security > Biometrics
The point in a fingerprint where a friction ridge divides or splits to form two ridges, as illustrated below. See also friction ridge, minutia(e) point, ridge ending.
- Browse Related Terms: Arch, Bifurcation, Core Point, Delta Point, Fingerprint Recognition, Friction Ridge, Latent Fingerprint, Loop, Minutia(e) Point, Ridge Ending, Whorl
Also listed in:
All > Technology > Security
An acknowledgement by a trusted third party that associates an entitys identity with its public key. This may take place through (1) a certification authoritys generation of a public key certificate, (2) a security officers verification of an entitys credentials and placement of the entitys public key and identifier in a secure database, or (3) an analogous method.
- Browse Related Terms: applicant, Binding, Certificate Management Authority (CMA), Certificate Status Authority, Certificate-Related Information, Credentials Service Provider (CSP), cross-certificate, Federal Bridge Certification Authority (FBCA), Federal Bridge Certification Authority Membrane, Intermediate Certification Authority (CA), Policy Mapping, Repository, Responsible Individual, Root Certification Authority, Subordinate Certification Authority (CA), Superior Certification Authority (CA), Trust Anchor, Trust List, Trusted Agent, Trusted Certificate
Also listed in:
All > Technology > Security > Biometrics
Process of parsing (examining) or classifying data in order to accelerate and/or improve biometric matching.
- Browse Related Terms: Automated Fingerprint Identification System (AFIS), benchmarking, Binning, Biometric System, CBEFF (Common Biometric Exchange Formats Framework), Claim of identity, Comparison, Enrollment, Extraction, Identification, Noise, One-to-many, One-to-one, Probe, Throughput Rate, Verification
All > Technology > Security > Biometrics
Defines the application programming interface and service provider interface for a standard biometric technology interface. The BioAPI enables biometric devices to be easily installed, integrated or swapped within the overall system architecture.
- Browse Related Terms: ANSI (American National Standards Institute), API (application programming interface), BioAPI (Biometrics Application Programming Interface), Biometric Consortium (BC), FERET (FacE REcognition Technology program), FpVTE - Fingerprint Vendor Technology Evaluation (2003), FRGC (Face Recognition Grand Challenge), FRVT (Face Recognition Vendor Test), ICE (Iris Challenge Evaluation), INCITS (International Committee for Information Technology Standards), ISO (International Organization for Standardization), NIST (National Institute of Standards and Technology), Speaker Recognition Evaluations, Speech Recognition, Voice Recognition
All > Technology > Security > Biometrics
A biometric characteristic based primarily on an anatomical or physiological characteristic, rather than a learned behavior. All biometric characteristics depend somewhat upon both behavioral and biological characteristic. Examples of biometric modalities for which biological characteristics may dominate include fingerprint and hand geometry. See also behavioral biometric characteristic.
- Browse Related Terms: Behavioral Biometric Characteristic, Biological Biometric Characteristic, Biometrics, Face Recognition, Gait, Hand Geometry Recognition, Iris Recognition, Keystroke Dynamics, Palm Print Recognition, Signature Dynamics, Speaker Recognition
All > Technology > Security
A measurable, physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an applicant. Facial images, fingerprints, and handwriting samples are all examples of biometrics.
- Browse Related Terms: biometric, Biometric Information, Biometric System, Biometric Template, Capture, Comparison, identifier, Match/matching, Template
Also listed in:
All > Technology > Security > Biometrics
An open forum to share information throughout government, industry, and academia. For more information visit www.biometrics.org.
- Browse Related Terms: ANSI (American National Standards Institute), API (application programming interface), BioAPI (Biometrics Application Programming Interface), Biometric Consortium (BC), FERET (FacE REcognition Technology program), FpVTE - Fingerprint Vendor Technology Evaluation (2003), FRGC (Face Recognition Grand Challenge), FRVT (Face Recognition Vendor Test), ICE (Iris Challenge Evaluation), INCITS (International Committee for Information Technology Standards), ISO (International Organization for Standardization), NIST (National Institute of Standards and Technology), Speaker Recognition Evaluations, Speech Recognition, Voice Recognition
All > Technology > Security > Biometrics
A catch-all phrase for computer data created during a biometric process. It encompasses raw sensor observations, biometric samples, models, templates and/or similarity scores. Biometric data is used to describe the information collected during an enrollment, verification, or identification process, but does not apply to end user information such as user name, demographic information and authorizations.
- Browse Related Terms: Biometric Data, Decision, Difference Score, Match, matching, Similarity Score
All > Technology > Security
The stored electronic information pertaining to a biometric. This information can be in terms of raw or compressed pixels or in terms of some characteristic (e.g. patterns.)
- Browse Related Terms: biometric, Biometric Information, Biometric System, Biometric Template, Capture, Comparison, identifier, Match/matching, Template
All > Technology > Security > Biometrics
Information or computer data obtained from a biometric sensor device. Examples are images of a face or fingerprint.
- Browse Related Terms: Biometric Sample, EFTS (Electronic Fingerprint Transmission Specification), Integrated Automated Fingerprint Identification System (IAFIS), Live Capture, Rolled Fingerprints, Segmentation, Sensor, Slap Fingerprint, Token, Wavelet Scalar Quantization (WSQ)
All > Technology > Security
An automated system capable of:
- 1) capturing a biometric sample from an end user;
- 2) extracting biometric data from that sample;
- 3) comparing the biometric data with that contained in one or more reference templates;
- 4) deciding how well they match; and
- 5) indicating whether or not an identification or verification of identity has been achieved.
- Browse Related Terms: biometric, Biometric Information, Biometric System, Biometric Template, Capture, Comparison, identifier, Match/matching, Template
All > Technology > Security > Biometrics
Multiple individual components (such as sensor, matching algorithm, and result display) that combine to make a fully operational system. A biometric system is an automated system capable of:
- Capturing a biometric sample from an end user
- Extracting and processing the biometric data from that sample
- Storing the extracted information in a database
- Comparing the biometric data with data contained in one or more reference references
- Deciding how well they match and indicating whether or not an identification or verification of identity has been achieved.
A biometric system may be a component of a larger system.
- Browse Related Terms: Automated Fingerprint Identification System (AFIS), benchmarking, Binning, Biometric System, CBEFF (Common Biometric Exchange Formats Framework), Claim of identity, Comparison, Enrollment, Extraction, Identification, Noise, One-to-many, One-to-one, Probe, Throughput Rate, Verification
All > Technology > Security
A characteristic of biometric information (e.g. minutiae or patterns.)
- Browse Related Terms: biometric, Biometric Information, Biometric System, Biometric Template, Capture, Comparison, identifier, Match/matching, Template
All > Technology > Security > Biometrics
A general term used alternatively to describe a characteristic or a process.
As a characteristic: A measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition.
As a process: Automated methods of recognizing an individual based on measurable biological (anatomical and physiological) and behavioral characteristics.
Also listed in:
- All > Healthcare > Medicine > Cancer
- All > Technology > Telecommunications
- All > Travel > Visa