All > Technology > Security
Occurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.
- Browse Related Terms: Access Control Lists (ACLs), Account Management, User, Audit Trail, Authentication Mechanism, availability, Client (Application), Discretionary Access Control, Honeypot, Identity-Based Security Policy, Least Privilege, Mandatory Access Control, Privileged Accounts, remote access, rule-based security policy, Unauthorized Access, user
All > Technology > Security
An event involving the exposure of information to entities not authorized access to the information.
- Browse Related Terms: Access Authority, Attack Signature, Brute Force Password Attack, Confidentiality, Distributed Denial of Service (DDoS), Inside Threat, Integrity, Outside Threat, Sandboxing, Software-Based Fault Isolation, unauthorized disclosure
Also listed in:
All > Technology > Security > Biometrics
An individual who actively tries to deny the capture of his/her biometric data. Example: A detainee mutilates his/her finger upon capture to prevent the recognition of his/her identity via fingerprint. See also cooperative user, indifferent user, noncooperative user.
- Browse Related Terms: Capture, Cooperative User, Covert, database, Eavesdropping, end user, Failure to Acquire (FTA), Failure to Enroll (FTE), Indifferent User, Non-cooperative User, Overt, record, Skimming, Submission, Uncooperative User, user
All > Technology > Security
Data included in an authentication token, in addition to a digital signature.
- Browse Related Terms: Digital Signature Algorithm, Dual-Use Certificate, Misnamed Files, S/MIME, Secure/Multipurpose Internet Mail Extensions (S/MIME), Signature Certificate, Signature Generation, Signature Verification, Signed Data, Unsigned data
All > Technology > Security
The act or process by which data items bound in an existing public key certificate, especially authorizations granted to the subject, are changed by issuing a new certificate.
- Browse Related Terms: CA (Certification Authority), certification, Certification Practice Statement (CPS), CRL (Certificate Revocation List), Duration, On-Line Certificate Status Protocol (OCSP), Online Certification Status Protocol (OCSP), public key infrastructure (PKI), Re-key (a certificate), Renew (a certificate), Update (a Certificate), X.509 Certificate, X.509 Public Key Certificate
All > Technology > Security > Biometrics
A continuum of security measures that begins overseas, at the Department of State's visa issuing posts, and continues through arrival and departure from the United States of America. Using biometric, such as digital, inkless fingerscans and digital photographs, the identity of visitors requiring a visa is now matched at each step to ensure that the person crossing the U.S. border is the same person who received the visa. For visa-waiver travelers, the capture of biometrics first occurs at the port of entry to the U.S. By checking the biometrics of a traveler against its databases, US-VISIT verifies whether the traveler has previously been determined inadmissible, is a know security risk (including having outstanding wants and warrants), or has previously overstayed the terms of a visa. These entry and exit procedures address the U.S. critical need for tighter security and ongoing commitment to facilitate travel for the millions of legitimate visitors welcomed each year to conduct business, learn, see family, or tour the country.
- Browse Related Terms: Closed-set Identification, Cumulative Match Characteristic (CMC), Detection and Identification Rate, Gallery, Identification Rate, Neural Net/Neural Network, Open-set Identification, Operational Evaluation, Scenario Evaluation, Technology Evaluation, Threshold, US-VISIT (U.S. Visitor and Immigrant Status Indicator Technology), Watchlist
All > Technology > Security
An individual or a process (subject) acting on behalf of the individual that accesses a cryptographic module in order to obtain cryptographic services.
- Browse Related Terms: Access Control Lists (ACLs), Account Management, User, Audit Trail, Authentication Mechanism, availability, Client (Application), Discretionary Access Control, Honeypot, Identity-Based Security Policy, Least Privilege, Mandatory Access Control, Privileged Accounts, remote access, rule-based security policy, Unauthorized Access, user
All > Technology > Security > Biometrics
A person, such as an administrator, who interacts with or controls end users' interactions with a biometric system. See also cooperative user, end user, indifferent user, non-cooperative user, uncooperative user.
Also listed in:
All > Technology > Security
A stage in the lifecycle of keying material; the process whereby a user initializes its cryptographic application (e.g., installing and initializing software and hardware).
- Browse Related Terms: Approved Security Function, Authentication protocol, Automated Password Generator, Compromise, Cryptographic Key, Cryptographic Module, Cryptoperiod, Decryption, FIPS Approved Security Method, Key Generation Material, Key Management, Secret Seed, User Initialization
All > Technology > Security
A stage in the lifecycle of keying material; a process whereby an entity becomes a member of a security domain.
- Browse Related Terms: certificate, indication, Multiple Component Incident, Precursor, Public Key Infrastructure, public-key certificate, Trusted Timestamp, User Registration