A term widely used by hackers to denote illegally copied and distributed commercial software from which all copy protection has been removed. Warez often contains viruses, Trojans and other malicious code and thus is very risky to download and use (legal issues notwithstanding).
- Browse Related Terms: Blended Attack, Botnet (also zombies), CATS, false positive, information, Intrusion Detection System (IDS), remediation, Sanitization, SPAM, Spyware, Warez
An environmentally conditioned workspace that is partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
- Browse Related Terms: Business Continuity Plan (BCP), Business Recovery-Resumption Plan (BRP), Contingency Plan, Continuity of Operations Plan (COOP), Continuity of Support Plan, Mobile Site, TEMPEST, warm site
Also listed in:
A term sometimes referred to as open-set identification that describes one of the three tasks that biometric systems perform. Answers the questions: Is this person in the database? If so, who are they? The biometric system determines if the individual's biometric template matches a biometric template of someone on the watchlist, as illustrated below. The individual does not make an identity claim, and in some cases does not personally interact with the system whatsoever. See also closed-set identification, identification, open-set identification, verification.
- Browse Related Terms: Closed-set Identification, Cumulative Match Characteristic (CMC), Detection and Identification Rate, Gallery, Identification Rate, Neural Net/Neural Network, Open-set Identification, Operational Evaluation, Scenario Evaluation, Technology Evaluation, Threshold, US-VISIT (U.S. Visitor and Immigrant Status Indicator Technology), Watchlist
An FBI-specified compression standard algorithm that is used for the exchange of fingerprints within the criminal justice community. It is used to reduce the data size of images.
- Browse Related Terms: Biometric Sample, EFTS (Electronic Fingerprint Transmission Specification), Integrated Automated Fingerprint Identification System (IAFIS), Live Capture, Rolled Fingerprints, Segmentation, Sensor, Slap Fingerprint, Token, Wavelet Scalar Quantization (WSQ)
Tiny images, invisible to a user, placed on web sites in such a way that they allow third parties to track use of web servers and collect information about the user, including IP address, Host name, browser type and version, operating system name and version, and web browser cookie.
- Browse Related Terms: cookie, Denial-of-service attack, Pharming, Phishing, proxy server, Tracking Cookie, Web Bug, Wireless Application Protocol (WAP)
- Browse Related Terms: Arch, Bifurcation, Core Point, Delta Point, Fingerprint Recognition, Friction Ridge, Latent Fingerprint, Loop, Minutia(e) Point, Ridge Ending, Whorl
Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP was intended to provide the same level of security as that of a wired LAN.
- Browse Related Terms: Antivirus Software, Boundary Router, Cyber Crime, Cyber warfare, Cyberspace, Demilitarized Zone (DMZ), Dynamic Host Configuration Protocol (DHCP), event, firewall, High Assurance Guard (HAG), IDS Network-Based, Incident management, Malicious code (also malware), packet sniffer, Physically Isolated Network, Proxy, server, Sniffer, Social Engineering, Virtual Private Network (VPN), Wired Equivalent Privacy (WEP)
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
- Browse Related Terms: agent, Backup, Boot Sector Virus, Computer Virus, Deleted File, Easter Egg, Exploit Code, File Infector Virus, handler, Macro Virus, malicious code, Mobile Code, Mobile Software Agent, Port Scanning, System Software, Trojan horse, Virus, Worm, Zombie
Also listed in: