All > Technology > Security > Biometrics
A large-scale development and independent technology evaluation activity for iris recognition systems sponsored by the U.S. Government in 2005. For more information visit iris.nist.gov/ICE.
- Browse Related Terms: ANSI (American National Standards Institute), API (application programming interface), BioAPI (Biometrics Application Programming Interface), Biometric Consortium (BC), FERET (FacE REcognition Technology program), FpVTE - Fingerprint Vendor Technology Evaluation (2003), FRGC (Face Recognition Grand Challenge), FRVT (Face Recognition Vendor Test), ICE (Iris Challenge Evaluation), INCITS (International Committee for Information Technology Standards), ISO (International Organization for Standardization), NIST (National Institute of Standards and Technology), Speaker Recognition Evaluations, Speech Recognition, Voice Recognition
All > Technology > Security
The process of discovering the true identity (i.e., origin, initial history) of a person or item from the entire collection of similar persons or items.
- Browse Related Terms: authenticate, Authentication, Authentication, Electronic, Electronic Authentication (E-authentication), Electronic Credentials, Identification, Identity Management, Identity Proofing, Personal Identity Verification Registration Authority, Pseudonym, Recipient Usage Period, registration, Relying Party, Subject, Verified Name
All > Technology > Security > Biometrics
A task where the biometric system searches a database for a reference matching a submitted biometric sample, and if found, returns a corresponding identity. A biometric is collected and compared to all the references in a database. Identification is "closed-set" if the person is known to exist in the database. In "open-set" identification, sometimes referred to as a "watchlist," the person is not guaranteed to exist in the database. The system must determine whether the person is in the database, then return the identity. See also closed-set identification, open-set identification, verification, watchlist.
- Browse Related Terms: Automated Fingerprint Identification System (AFIS), benchmarking, Binning, Biometric System, CBEFF (Common Biometric Exchange Formats Framework), Claim of identity, Comparison, Enrollment, Extraction, Identification, Noise, One-to-many, One-to-one, Probe, Throughput Rate, Verification
All > Technology > Security > Biometrics
The rate at which an individual in a database is correctly identified.
- Browse Related Terms: Closed-set Identification, Cumulative Match Characteristic (CMC), Detection and Identification Rate, Gallery, Identification Rate, Neural Net/Neural Network, Open-set Identification, Operational Evaluation, Scenario Evaluation, Technology Evaluation, Threshold, US-VISIT (U.S. Visitor and Immigrant Status Indicator Technology), Watchlist
All > Technology > Security
A unique data string used as a key in the biometric system to name a persons identity and its associated attributes.
- Browse Related Terms: biometric, Biometric Information, Biometric System, Biometric Template, Capture, Comparison, identifier, Match/matching, Template
Also listed in:
- All > Technology > Programming > Java
- All > Technology > Programming > Perl
All > Technology > Security
The set of physical and behavioral characteristics by which an individual is uniquely recognizable.
- Browse Related Terms: Accreditation, Accrediting Authority, authorization, Authorize Processing, Authorizing Official, Certification and Accreditation (C&A), Cyber warriors, Identity, Risk, Risk Assessment, Security Accreditation, Security Authorization
Also listed in:
- All > Technology > GIS
All > Technology > Security
A security policy based on the identities and/or attributes of the object (system resource) being accessed and of the subject (user, group of users, process, or device) requesting access.
- Browse Related Terms: Access Control Lists (ACLs), Account Management, User, Audit Trail, Authentication Mechanism, availability, Client (Application), Discretionary Access Control, Honeypot, Identity-Based Security Policy, Least Privilege, Mandatory Access Control, Privileged Accounts, remote access, rule-based security policy, Unauthorized Access, user
All > Technology > Security
Binding of the vetted claimed identity to the individual (through biometrics) according to the issuing authority.
- Browse Related Terms: False Acceptance, False Acceptance Rate, False Match Rate (FMR), False Non Match Rate (FNMR), False Rejection, False Rejection Rate (FRR), Identity Binding, Masquerading
All > Technology > Security > Biometrics
The combination of policies and actions taken to ensure enterprise-wide consistency, privacy protection and appropriate interoperability between individual identity management systems.
- Browse Related Terms: Attempt, Challenge Response, Identity Governance, Identity Management, Impostor, Liveness Detection, Mimic, Population, Spoofing, Threat, Vulnerability
All > Technology > Security
A method of validating a person’s identity when he/she tries to access a network.
- Browse Related Terms: authenticate, Authentication, Authentication, Electronic, Electronic Authentication (E-authentication), Electronic Credentials, Identification, Identity Management, Identity Proofing, Personal Identity Verification Registration Authority, Pseudonym, Recipient Usage Period, registration, Relying Party, Subject, Verified Name
All > Technology > Security > Biometrics
The combination of systems, rules and procedures that defines an agreement between an individual and organization(s) regarding ownership, utilization and safeguard of personal identity information.
Also listed in:
- All > Technology > Search > Enterprise Search
All > Technology > Security
The process of providing sufficient information (e.g., identity history, credentials, documents) to a Personal Identity Verification Registrar when attempting to establish an identity.
- Browse Related Terms: authenticate, Authentication, Authentication, Electronic, Electronic Authentication (E-authentication), Electronic Credentials, Identification, Identity Management, Identity Proofing, Personal Identity Verification Registration Authority, Pseudonym, Recipient Usage Period, registration, Relying Party, Subject, Verified Name
All > Technology > Security
The process of making a persons identity known to the Personal Identity Verification (PIV) system, associating a unique identifier with that identity, and collecting and recording the persons relevant attributes into the system.
- Browse Related Terms: Cardholder, Identity Registration, Identity Verification, interoperability, Mandatory Topography, Off-Card, On-Card, Optional Topography, Parent Organization, Personal Identity Verification Card (PIV Card), Personal Identity Verification Issuance Authority, Standard Topography, topology, Verification
All > Technology > Security
The process of confirming or denying that a claimed identity is correct by comparing the credentials (something you know, something you have, something you are) of a person requesting access with those previously proven and stored in the PIV Card or system and associated with the identity being claimed.
- Browse Related Terms: Cardholder, Identity Registration, Identity Verification, interoperability, Mandatory Topography, Off-Card, On-Card, Optional Topography, Parent Organization, Personal Identity Verification Card (PIV Card), Personal Identity Verification Issuance Authority, Standard Topography, topology, Verification
All > Technology > Security
SEE Intrusion Detection System
- Browse Related Terms: Bastion Host, Boundary Protection, Computer Security Incident Response Team (CSIRT), Firewall Control Proxy, Firewall Environment, Firewall Platform, Firewall Ruleset, Guard (System), IDS, Incident Response Plan, Intrusion Prevention Systems, IT Security Architecture, Media, Proxy Agent, security perimeter
Also listed in:
- All > Law > Intellectual Property
- All > Technology > Defense
All > Technology > Security
IDSs which operate on information collected from within an individual computer system. This vantage point allows host-based IDSs to determine exactly which processes and user accounts are involved in a particular attack on the Operating System. Furthermore, unlike network-based IDSs, host-based IDSs can more readily see the intended outcome of an attempted attack, because they can directly access and monitor the data files and system processes usually targeted by attacks.
- Browse Related Terms: Buffer Overflow, Cracking (also Crackers), Hacker, IDS Host-Based, Keystroke Monitoring, Min-Entropy, Password Protected, Rootkit, scanning, script kiddie, Signature, Victim
All > Technology > Security
IDSs which detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment.
- Browse Related Terms: Antivirus Software, Boundary Router, Cyber Crime, Cyber warfare, Cyberspace, Demilitarized Zone (DMZ), Dynamic Host Configuration Protocol (DHCP), event, firewall, High Assurance Guard (HAG), IDS Network-Based, Incident management, Malicious code (also malware), packet sniffer, Physically Isolated Network, Proxy, server, Sniffer, Social Engineering, Virtual Private Network (VPN), Wired Equivalent Privacy (WEP)
All > Technology > Security
An exact bit-stream copy of all electronic data on a device, performed in a manner that ensures the information is not altered.
- Browse Related Terms: analysis, Buffer Overflow Attack, Cyclical Redundancy Check (CRC), Data Element, Data Integrity, Duplicate Digital Evidence, Electronic Evidence, Forensic Copy, Image, Media Sanitization, Protocol Data Unit, Purge
Also listed in:
All > Technology > Security
The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability.
Also listed in:
- All > Science > Energy > Renewable Energy > Solar Energy
- All > Science > Water
All > Technology > Security > Biometrics
A person who submits a biometric sample in either an intentional or inadvertent attempt to claim the identity of another person to a biometric system. See also attempt.
- Browse Related Terms: Attempt, Challenge Response, Identity Governance, Identity Management, Impostor, Liveness Detection, Mimic, Population, Spoofing, Threat, Vulnerability
All > Technology > Security
A person who violates acceptable computing use policies.
- Browse Related Terms: Computer Security Incident, Graduated Security, Inappropriate Usage, Privacy Impact Assessment, Residual Risk, Risk Management, Risk Tolerance, Security Level, Sensitivity Levels
All > Technology > Security
An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.
- Browse Related Terms: assurance, Baseline Security, Cybersecurity, High Impact System, Incident, Information Assurance, Information Security, IT Security Goal, IT Security Metrics, Low Impact System, Malware, Moderate Impact System, Naming Authority, Potential Impact, Safeguards, Security Category, Security Controls, Security Goals, Security Objective, Security Requirements, sensitivity, Trustworthy System