All > Technology > Security
A payload, an associated data string, or a nonce that satisfies the restrictions of the formatting function.
- Browse Related Terms: Authentication Tag, Block Cipher Algorithm, Cryptographic Hash Function, Error Detection Code, Guessing Entropy, Hash Function, security attribute, Security Tag, Valid Data Element
All > Technology > Security
The process of demonstrating that the system under consideration meets in all respects the specification of that system.
- Browse Related Terms: Information Security Policy, Information Type, IT Security Policy, Memorandum of Understanding/Agreement (MOU/A), Needs Assessment (IT Security Awareness and Training), Plan of Action and Milestones (POA&M), policy, Registration Authority (RA), Trustworthiness, Validation
Also listed in:
All > Technology > Security
The process of affirming that a claimed identity is correct by comparing the offered claims of identity with previously proven information stored in the identity card or PIV system. See Identity Verification.
- Browse Related Terms: Cardholder, Identity Registration, Identity Verification, interoperability, Mandatory Topography, Off-Card, On-Card, Optional Topography, Parent Organization, Personal Identity Verification Card (PIV Card), Personal Identity Verification Issuance Authority, Standard Topography, topology, Verification
All > Technology > Security > Biometrics
A task where the biometric system attempts to confirm an individual's claimed identity by comparing a submitted sample to one or more previously enrolled templates. See also identification, watchlist.
Also listed in:
All > Technology > Security > Biometrics
A statistic used to measure biometric performance when operating in the verification task. The rate at which legitimate end-users are correctly verified.
- Browse Related Terms: Accuracy, Crossover Error Rate (CER), D-Prime (D'), Degrees of Freedom, Detection Error Trade-off (DET) Curve, Equal Error Rate (EER), False Match Rate, False Non-Match Rate, Performance, Receiver Operating Characteristics (ROC), Verification Rate
All > Technology > Security
A subscriber name that has been verified by identity proofing.
- Browse Related Terms: authenticate, Authentication, Authentication, Electronic, Electronic Authentication (E-authentication), Electronic Credentials, Identification, Identity Management, Identity Proofing, Personal Identity Verification Registration Authority, Pseudonym, Recipient Usage Period, registration, Relying Party, Subject, Verified Name
All > Technology > Security
An entity which is or represents the entity requiring an authenticated identity. A verifier includes the functions necessary for engaging in authentication exchanges.
- Browse Related Terms: Authentication Token, Claimant, Distinguishing Identifier, Initiator, Key Exchange, mutual authentication, Non-repudiation, Object, Principal, Protocol Entity, Responder, Spoofing, steganography, verifier
Also listed in:
All > Technology > Security
An attack where the attacker impersonates the verifier in an authentication protocol, usually to learn a password.
- Browse Related Terms: authenticity, Entity, Kerberos, Man-in-the-middle Attack (MitM), Off-line Attack, On-line Attack, Passive Attack, password, Personal Identification Number (PIN), Practice Statement, Proof of Possession Protocol (PoP Protocol), Protocol Run, Secure Communication Protocol, Shared Secret, Subscriber, Token, Transport Layer Security (TLS), Tunneled Password Protocol, Verifier Impersonation Attack
All > Technology > Security
A virtual private network is a logical network that is established, at the application layer of the Open Systems Interconnection (OSI) model, over an existing physical network and typically does not include every node present on the physical network.
- Browse Related Terms: Antivirus Software, Boundary Router, Cyber Crime, Cyber warfare, Cyberspace, Demilitarized Zone (DMZ), Dynamic Host Configuration Protocol (DHCP), event, firewall, High Assurance Guard (HAG), IDS Network-Based, Incident management, Malicious code (also malware), packet sniffer, Physically Isolated Network, Proxy, server, Sniffer, Social Engineering, Virtual Private Network (VPN), Wired Equivalent Privacy (WEP)
Also listed in:
All > Technology > Security
A program designed to degrade service, cause inexplicable symptoms or damage networks.
A self-replicating program that runs and spreads by modifying other programs or files
Also listed in:
- All > Healthcare > Medicine > Cancer
- All > Healthcare > Medicine > Hantavirus
- All > Healthcare > Medicine > Malaria
- All > Law > E-Discovery
- All > Science > Biotechnology and Genetics > Food Biotechnology
- All > Science > Biotechnology and Genetics > Human Genome
- All > Science > Biotechnology and Genetics > Stem Cell
- All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
- All > Technology > Telecommunications
All > Technology > Security
An urgent warning message about a nonexistent virus.
- Browse Related Terms: Authentication Code, Challenge-Response Protocol, File Integrity Checker, Hash-based Message Authentication Code (HMAC), IP address, Keyed-hash based message authentication code (HMAC), Message Authentication Code (MAC), Message Digest, nonce, Secure Hash Algorithm (SHA-1), SHA-1, Traffic Analysis, Virus Hoax
All > Technology > Security > Identity Theft
All > Technology > Security > Biometrics
See speaker recognition.
- Browse Related Terms: ANSI (American National Standards Institute), API (application programming interface), BioAPI (Biometrics Application Programming Interface), Biometric Consortium (BC), FERET (FacE REcognition Technology program), FpVTE - Fingerprint Vendor Technology Evaluation (2003), FRGC (Face Recognition Grand Challenge), FRVT (Face Recognition Vendor Test), ICE (Iris Challenge Evaluation), INCITS (International Committee for Information Technology Standards), ISO (International Organization for Standardization), NIST (National Institute of Standards and Technology), Speaker Recognition Evaluations, Speech Recognition, Voice Recognition
All > Technology > Security
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
- Browse Related Terms: Common Vulnerabilities and Exposures (CVE), CVE, IT-Related Risk, Remediation Plan, system integrity, Threat, Threat Agent/Source, Threat Analysis, Threat Assessment, Threat Source, Total Risk, Vulnerability, Vulnerability Assessment
All > Technology > Security > Biometrics
The potential for the function of a biometric system to be compromised by intent (fraudulent activity); design flaw (including usage error); accident; hardware failure; or external environmental condition. See also threat.
- Browse Related Terms: Attempt, Challenge Response, Identity Governance, Identity Management, Impostor, Liveness Detection, Mimic, Population, Spoofing, Threat, Vulnerability
Also listed in:
All > Technology > Security
Formal description and evaluation of the vulnerabilities in an information system.
- Browse Related Terms: Common Vulnerabilities and Exposures (CVE), CVE, IT-Related Risk, Remediation Plan, system integrity, Threat, Threat Agent/Source, Threat Analysis, Threat Assessment, Threat Source, Total Risk, Vulnerability, Vulnerability Assessment
Also listed in: