Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
f
F.I.R.E.
FACCI
Facilitator
Facilitator Guide
Facility
Facility (mobile device)
Facility (static device)
Fail Safe
Fail Secure
Fail Soft
Failover
Failure Access
Failure Control
Failure To Enroll Rate
Fair Information Practice Principles
False Accept Rate ((defined over an authentication transaction))
False Accept Rate
False Acceptance
False Match Rate ((defined over single comparisons))
False Negative
False Non-Match Rate ((defined over single comparisons))
False Positive
False Reject Rate ((defined over an authentication transaction))
False Reject Rate
False Rejection
FAM
Family Education Rights Privacy Act
FAQ
FAR
FASC-N
Fast IDentity Online
Fast Reconnect
Fast User Switching
FAT
Fault Injection Testing
Fault Tolerant
Fault Tree Analysis
FBCA
FBCA Operational Authority
FBI
FCC
FCC ID
FCKMS (compromised)
FCKMS (Component)
FCKMS (Device)
FCKMS architecture
FCKMS documentation
FCKMS functions
FCKMS module
FCKMS personnel
FCKMS Security Domain
FCKMS Security Policy
FCKMS service provider
FCKMS service-providing organization
FCKMS services (protections)
FCKMS service-using organization
FCS
FDA
FDCC
FDCE
FDE
FEA
FEA-SPP
Feature
Feature Phone
Feature Set
Federal Acquisition Register
Federal Acquisition Regulation
Federal Agency
Federal Agency Smart Credential Number
Federal Bridge Certificate Authority
Federal Bridge Certification Authority
Federal Bridge Certification Authority Membrane
Federal Bureau Of Investigation
Federal Communications Commission
Federal Communications Commission Identification Number
Federal Cryptographic Key Management System (FCKMS)
Federal Desktop Core Configuration
Federal Emergency Management Agency
Federal Enterprise Architecture
Federal Enterprise Architecture (FEA Program Management Office)
Federal Enterprise Architecture Security And Privacy Profile
Federal Financial Management Improvement Act
Federal Identity Credentialing Committee
Federal Identity, Credential, And Access Management
Federal Information Processing Standard
Federal Information Processing Standard(s)
Federal Information Processing Standards
Federal Information Processing Standards Publications
Federal Information Processing Standards-Validated Cryptography
Federal Information Processing
Standards

Federal Information Security Management Act
Federal Information Security Management Act Of 2002
Federal Information Security Modernization Act
Federal Information System
Federal Information System Controls Audit Manual
Federal Information Systems Security Educator’s Association
Federal Information Technology Security Assessment Framework
Federal Law Enforcement Training Center
Federal Managers Financial Integrity Act
Federal Preparedness Circular
Federal Public Key Infrastructure Policy Authority
Federally Aided Organizations
Federated Development And Certification Environment
Federated Trust
Federation
FEK
FEMA
FERPA
FF
FFC
FFMIA
FHSS
FIB
FICAM
FICC
FIDO
Field Device
Field Site
Fieldbus
Field-programmable gate array
File
File Allocation Table
File Allocation Unit
File Association
File Encryption
File Encryption Key
File Extension
File Header
File Integrity Checking
File Name Anomaly
File Protection
File Signature Anomaly
File Slack
File System
File Transfer Protocol
File Transfer Protocol Secure
Filename
Filesystem
Fill Device
Final Checklist
Financial Audit Manual
Fingerprint Segmentation
Finite Field
Finite Field Cryptography
Finite State Model
FIPS
FIPS 140 security level
FIPS PUB
FIPS Publication
FIPS-validated cryptography
Firefly
Firefly Credential Manager
Firewall
Firewall Control Proxy
Firmware
FIRST
First Byte Of A Two-Byte Status Word
First Parameter Of A Card Command
Fiscal Year
FISCAM
FISMA
FISMA Report
FISSEA
Fit For Purpose
FITSAF
Fixed Comsec Facility
Fixed Field
Flapping
Flash ROM
FLETC
Flooding
Florida Association Of Computer Crime Investigators
Flow
Flow Label (IPv6 Field)
Fluhrer-Mantin-Shamir
FMFIA
FMR
FMS
FNMR
Focused Observation
Focused Testing
FOIA
Folder
Folder Encryption
Food And Drug Administration
Forbidden PLMNs
Foreign Link
Forensic And Incident Response Environment
Forensic Copy
Forensic Science
Forensic Specialist
Forensically Clean
Forensics
Form Factor
Formal Access Approval
Formal Language
Formal Method
Formal Policy Model
Format
Formatting Function
Forum Of Incident Response And Security Teams
Forward Channel
Forward Cipher Function
Forward Cipher Functionforward Cipher Operation
Forward Cipher Operation
Forward Cipher Operation/Forward Transformation
Forward Transformation
Forwarding Information Base
FPC
FPGA
FPKI PA
FQDN
FR
Fragment Header (IPv6 extension header)
Frame Body
Frame Check Sequence
Frame Control Field
Framework
Framework (for CKMS)
Framework Requirement
Framework Response
Framework Topic
Free Field
Free Space
Freedom Of Information Act
French Security Incident Response Team
Frequency Hopping
Frequency Hopping Spread Spectrum
Frequently Asked Questions
Fresh
Fresh Entropy
FRR
FrSIRT
FT
FTE
FTP
FTPS
Full Disk Encryption
Full Entropy
Full Tunneling
Full Virtualization
Full/Depot Maintenance
Fully Qualified Domain Name
Functional Exercise
Functional Testing
Functionality Testing
FUS
Fuzz Testing
FY