All > Technology > Security
SEE Security Label.
Also listed in:
- All > Healthcare > Medicine > Drug
- All > Science > Biotechnology and Genetics > Food Biotechnology
- All > Technology > E-mail > Lotus Domino
- All > Technology > Programming > Perl
All > Technology > Security > Biometrics
A fingerprint "image" left on a surface that was touched by an individual. The transferred impression is left by the surface contact with the friction ridges, usually caused by the oily residues produced by the sweat glands in the finger. See also friction ridge.
- Browse Related Terms: Arch, Bifurcation, Core Point, Delta Point, Fingerprint Recognition, Friction Ridge, Latent Fingerprint, Loop, Minutia(e) Point, Ridge Ending, Whorl
All > Technology > Security
The security objective of granting users only those accesses they need to perform their official duties.
- Browse Related Terms: Access Control Lists (ACLs), Account Management, User, Audit Trail, Authentication Mechanism, availability, Client (Application), Discretionary Access Control, Honeypot, Identity-Based Security Policy, Least Privilege, Mandatory Access Control, Privileged Accounts, remote access, rule-based security policy, Unauthorized Access, user
Also listed in:
- All > Technology > Defense
All > Technology > Security
Link encryption encrypts all of the data along a communications path (e.g., a satellite link, telephone circuit, or T1 line). Since link encryption also encrypts routing data, communications nodes need to decrypt the data to continue routing.
- Browse Related Terms: Asymmetric Keys, Cryptography, key, Link Encryption, Plaintext, Public (Asymmetric) Key Encryption, Secret (Symmetric) Key Encryption, Secret Key (symmetric) Cryptographic Algorithm, Symmetric Encryption Algorithm
All > Technology > Security > Biometrics
Typically refers to a fingerprint capture device that electronically captures fingerprint images using a sensor (rather than scanning ink-based fingerprint images on a card or lifting a latent fingerprint from a surface). See also sensor.
- Browse Related Terms: Biometric Sample, EFTS (Electronic Fingerprint Transmission Specification), Integrated Automated Fingerprint Identification System (IAFIS), Live Capture, Rolled Fingerprints, Segmentation, Sensor, Slap Fingerprint, Token, Wavelet Scalar Quantization (WSQ)
All > Technology > Security > Biometrics
A technique used to ensure that the biometric sample submitted is from an end user. A liveness detection method can help protect the system against some types of spoofing attacks. See also challenge response, mimic, spoofing.
- Browse Related Terms: Attempt, Challenge Response, Identity Governance, Identity Management, Impostor, Liveness Detection, Mimic, Population, Spoofing, Threat, Vulnerability
All > Technology > Security
A Registration Authority with responsibility for a local community.
- Browse Related Terms: Certification Agent, Certification Authority Facility, Federal Bridge Certification Authority Operational Authority, Federal Public Key Infrastructure Policy Authority (FPKI PA), Local Registration Authority (LRA), Policy Management Authority (PMA), Principal Certification Authority (CA), Revoke a Certificate, security domain
All > Technology > Security > Biometrics
A fingerprint pattern in which the friction ridges enter from either side, curve sharply and pass out near the same side they entered as illustrated below. This pattern will contain one core and one delta. See also arch, core point, delta point, friction ridge, whorl.
- Browse Related Terms: Arch, Bifurcation, Core Point, Delta Point, Fingerprint Recognition, Friction Ridge, Latent Fingerprint, Loop, Minutia(e) Point, Ridge Ending, Whorl
Also listed in:
- All > Technology > Programming > Perl
All > Technology > Security
An information system in which all three security objectives (i.e., confidentiality, integrity, and availability) are assigned a FIPS 199 potential impact of low.
- Browse Related Terms: assurance, Baseline Security, Cybersecurity, High Impact System, Incident, Information Assurance, Information Security, IT Security Goal, IT Security Metrics, Low Impact System, Malware, Moderate Impact System, Naming Authority, Potential Impact, Safeguards, Security Category, Security Controls, Security Goals, Security Objective, Security Requirements, sensitivity, Trustworthy System