All > Technology > Security > Biometrics
A statistical measure of how well a system can discriminate between a signal and a non-signal.
- Browse Related Terms: Accuracy, Crossover Error Rate (CER), D-Prime (D'), Degrees of Freedom, Detection Error Trade-off (DET) Curve, Equal Error Rate (EER), False Match Rate, False Non-Match Rate, Performance, Receiver Operating Characteristics (ROC), Verification Rate
All > Technology > Security
SEE Designated Approving Authority
- Browse Related Terms: Approved, attribute authority, DAA, FIPS, FIPS PUB, Object Identifier, Standard
Also listed in:
- All > Technology > Defense
All > Technology > Security
A basic unit of information that has a unique meaning and subcategories (data items) of distinct value. Examples of data elements include gender, race, and geographic location.
- Browse Related Terms: analysis, Buffer Overflow Attack, Cyclical Redundancy Check (CRC), Data Element, Data Integrity, Duplicate Digital Evidence, Electronic Evidence, Forensic Copy, Image, Media Sanitization, Protocol Data Unit, Purge
Also listed in:
- All > Law > E-Discovery
All > Technology > Security
The cryptographic engine that is used by the Triple Data Encryption Algorithm (TDEA).
- Browse Related Terms: Ciphertext, Cryptology, Data Encryption Algorithm (DEA), Data Encryption Standard (DES), Encrypted Key, Encrypted Network, Encryption Certificate, end-to-end encryption, Escrow, Initialization Vector (IV), Key Bundle, Key Wrap, Payload, Rijndael, Secure Socket Layer and Transport Layer Security (SSL and TSL), Triple DES
All > Technology > Security
A U.S. Government-approved, symmetric cipher, encryption algorithm used by business and civilian government agencies. The Advanced Encryption Standard (AES) is designed to replace DES. The original single DES algorithm is no longer secure because it is now possible to try every possible key with special purpose equipment or a high performance cluster. Triple DES (see glossary entry below), however, is still considered to be secure.
- Browse Related Terms: Ciphertext, Cryptology, Data Encryption Algorithm (DEA), Data Encryption Standard (DES), Encrypted Key, Encrypted Network, Encryption Certificate, end-to-end encryption, Escrow, Initialization Vector (IV), Key Bundle, Key Wrap, Payload, Rijndael, Secure Socket Layer and Transport Layer Security (SSL and TSL), Triple DES
All > Technology > Security
The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing, and while in transit.
- Browse Related Terms: analysis, Buffer Overflow Attack, Cyclical Redundancy Check (CRC), Data Element, Data Integrity, Duplicate Digital Evidence, Electronic Evidence, Forensic Copy, Image, Media Sanitization, Protocol Data Unit, Purge
Also listed in:
- All > Technology > Defense
- All > Technology > GIS
All > Technology > Security > Biometrics
A collection of one or more computer files. For biometric systems, these files could consist of biometric sensor readings, templates, match results, related end user information, etc. See also gallery.
Also listed in:
- All > Law > E-Discovery
- All > Law > Forensic Science
- All > Technology > E-mail > Lotus Domino
- All > Technology > GIS
- All > Technology > Records Management
All > Technology > Security > Biometrics
The resultant action taken (either automated or manual) based on a comparison of a similarity score (or similar measure) and the system's threshold. See also comparison, similarity score, threshold.
- Browse Related Terms: Biometric Data, Decision, Difference Score, Match, matching, Similarity Score
Also listed in:
- All > Law > Common Legal Terms
All > Technology > Security
Conversion of ciphertext to plaintext through the use of a cryptographic algorithm.
- Browse Related Terms: Approved Security Function, Authentication protocol, Automated Password Generator, Compromise, Cryptographic Key, Cryptographic Module, Cryptoperiod, Decryption, FIPS Approved Security Method, Key Generation Material, Key Management, Secret Seed, User Initialization
Also listed in:
- All > Law > E-Discovery
- All > Technology > Records Management
All > Technology > Security > Biometrics
A statistical measure of how unique biometric data is. Technically, it is the number of statistically independent features (parameters) contained in biometric data.
- Browse Related Terms: Accuracy, Crossover Error Rate (CER), D-Prime (D'), Degrees of Freedom, Detection Error Trade-off (DET) Curve, Equal Error Rate (EER), False Match Rate, False Non-Match Rate, Performance, Receiver Operating Characteristics (ROC), Verification Rate
All > Technology > Security
A file that has been logically, but not necessarily physically, erased from the operating system, perhaps to eliminate potentially incriminating evidence. Deleting files does not always necessarily eliminate the possibility of recovering all or part of the original data.
- Browse Related Terms: agent, Backup, Boot Sector Virus, Computer Virus, Deleted File, Easter Egg, Exploit Code, File Infector Virus, handler, Macro Virus, malicious code, Mobile Code, Mobile Software Agent, Port Scanning, System Software, Trojan horse, Virus, Worm, Zombie
Also listed in:
- All > Law > E-Discovery
All > Technology > Security > Biometrics
Part of a fingerprint pattern that looks similar to the Greek letter delta (Δ), as illustrated below. Technically, it is the point on a friction ridge at or nearest to the point of divergence of two type lines, and located at or directly in front of the point of divergence. See also core point, friction ridge.
- Browse Related Terms: Arch, Bifurcation, Core Point, Delta Point, Fingerprint Recognition, Friction Ridge, Latent Fingerprint, Loop, Minutia(e) Point, Ridge Ending, Whorl
All > Technology > Security
A network created by connecting two firewalls. Systems that are externally accessible but need some protections are usually located on DMZ networks.
- Browse Related Terms: Antivirus Software, Boundary Router, Cyber Crime, Cyber warfare, Cyberspace, Demilitarized Zone (DMZ), Dynamic Host Configuration Protocol (DHCP), event, firewall, High Assurance Guard (HAG), IDS Network-Based, Incident management, Malicious code (also malware), packet sniffer, Physically Isolated Network, Proxy, server, Sniffer, Social Engineering, Virtual Private Network (VPN), Wired Equivalent Privacy (WEP)
All > Technology > Security
The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)
- Browse Related Terms: access, application, Baselining, chain of custody, Computer Security Object (CSO), Computer Security Objects Register, Control Information, Denial of Service (DoS), Information Resources, information system, Metrics, records, security label, System, System Interconnection
All > Technology > Security
Flooding the networks or servers of individuals or organizations with false data requests so they are unable to respond to requests from legitimate users.
- Browse Related Terms: cookie, Denial-of-service attack, Pharming, Phishing, proxy server, Tracking Cookie, Web Bug, Wireless Application Protocol (WAP)
All > Technology > Security
The individual selected by an authorizing official to act on their behalf in coordinating and carrying out the necessary activities required during the security certification and accreditation of an information system.
- Browse Related Terms: Accreditation Authority, Accreditation Boundary, Accreditation Package, Authorizing Official Designated Representative, Common Security Control, Credential, Designated Approving (Accrediting) Authority (DAA), Information Owner, Security Impact Analysis, Senior Agency Information Security Officer
All > Technology > Security > Biometrics
The rate at which individuals, who are in a database, are properly identified in an open-set identification (watchlist) application. See also open-set identification, watchlist.
- Browse Related Terms: Closed-set Identification, Cumulative Match Characteristic (CMC), Detection and Identification Rate, Gallery, Identification Rate, Neural Net/Neural Network, Open-set Identification, Operational Evaluation, Scenario Evaluation, Technology Evaluation, Threshold, US-VISIT (U.S. Visitor and Immigrant Status Indicator Technology), Watchlist
All > Technology > Security > Biometrics
A graphical plot of measured error rates, as illustrated below. DET curves typically plot matching error rates (false non-match rate vs. false match rate) or decision error rates (false reject rate vs. false accept rate). See also Receiver Operating Characteristics.
- Browse Related Terms: Accuracy, Crossover Error Rate (CER), D-Prime (D'), Degrees of Freedom, Detection Error Trade-off (DET) Curve, Equal Error Rate (EER), False Match Rate, False Non-Match Rate, Performance, Receiver Operating Characteristics (ROC), Verification Rate
All > Technology > Security > Biometrics
A value returned by a biometric algorithm that indicates the degree of difference between a biometric sample and a reference. See also hamming distance, similarity score.
- Browse Related Terms: Biometric Data, Decision, Difference Score, Match, matching, Similarity Score
All > Technology > Security
An analysis of the variations of the electrical power consumption of a cryptographic module, using advanced statistical methods and/or other techniques, for the purpose of extracting information correlated to cryptographic keys used in a cryptographic algorithm.
- Browse Related Terms: Activation Data, Automated Key Transport, Critical Security Parameter, Cryptographic Boundary, Differential Power Analysis (DPA), Electronic Key Entry, firmware, IP Security (IPsec), Key Escrow, Key Escrow System, Key Establishment, Key Loader, Key Transport, Manual Key Transport, port, Split Knowledge, Zeroization