Glossary- F Flashcards Preview

CISA > Glossary- F > Flashcards

Flashcards in Glossary- F Deck (30):
1

alse accept rate (FAR)

The rate at which invalid subjects are accepted as valid. This occurs when the biometric system has too large a margin of error. See also biometrics.

2

false reject rate (FRR)

The rate at which valid subjects are rejected. This occurs when the biometric system has too small a margin of error. See also biometrics.

3

feasibility study

An activity that seeks to determine the expected benefits of a pro- gram or project.

4

fence

A structure that prevents or deters passage by unauthorized personnel.

5

fiber distributed data interface (FDDI)

A local area network technology that con- sists of a “dual ring” with redundant network cabling and counter-rotating logical tokens.

6

fiber optics

A cabling standard that uses optical fiber instead of metal conductors.

7

Fibre Channel

A standard protocol for assembling a stream of data into frames for transport over a physical medium from one station to another on a local area network. Fibre Channel is most often found in storage area networks. See also storage area network.

8

field

A unit of storage in a relational database management system (rDBMS) that consists of a single data item within a row. See also relational database management sys- tem, table, and row.

9

file

A sequence of zero or more characters that is stored as a whole in a file system. A file may be a document, spreadsheet, image, sound file, computer program, or data that is used by a program. See also file system.

10

file allocation table (FAT)

A file system used by the MS-DOS operating system as well as by early versions of the Microsoft Windows operating system.

11

file server

A server that is used to store files in a central location, usually to make them available to many users.

12

file system

A logical structure that facilitates the storage of data on a digital storage medium such as a hard drive, CD/DVD-ROM, or flash memory device.

13

file transfer protocol (FTP)

An early and still widely used TCP/IP application layer protocol that is used for the batch transfer of files or entire directories from one system to another.

14

file transfer protocol secure (FTPS)

A TCP/IP application layer protocol that is an extension of the FTP protocol where authentication and transport are encrypted using SSL or TLS. See also File Transfer Protocol (FTP), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).

15

financial audit

An audit of an accounting system, accounting department processes, and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.

16

financial management

Management for IT services that consists of several activities, including budgeting, capital investment, expense management, project accounting, and project ROI. See also IT service management, return on investment.

17

fire extinguisher

A hand-operated fire suppression device used for fighting small fires.

18

fire sprinkler system

A fire suppression system that extinguishes a fire by spraying water on it.

19

firewall

A device that controls the flow of network messages between networks. Placed at the boundary between the Internet and an organization’s internal network, firewalls enforce security policy by prohibiting all inbound traffic except for the spe- cific few types of traffic that are permitted to a select few systems.

20

firmware

A computer’s special-purpose storage that is usually used to store the in- structions required to start the computer system. Firmware is usually implemented in ROM, PROM, EPROM, EEPROM, or flash.

21

first in first out (FIFO)

A backup media rotation scheme where the oldest backup volumes are used next. See also backup media rotation.

22

flash

A form of permanent memory that can be rewritten by the computer that it is installed on. Flash memory is used by several types of devices, including SD (Secure Digital) cards, Compact Flash, Memory Stick, and USB drives.

23

foreign key

A field in a table in a relational database management system (rDBMS) that references a field in another table. See also relational database management system, table, row, and field.

24

forensic audit

An audit that is performed in support of an anticipated or active legal proceeding.

25

forensics

The application of procedures and tools during an investigation of a com- puter or network-related event.

26

fourth-generation language (4GL)

A variety of tools that are used in the develop- ment of applications, or that are parts of the applications themselves.

27

Frame Relay

A common carrier standard for transporting packets from one network to another. Frame Relay is being replaced by MPLS. See also multiprotocol label switching (MPLS).

28

fraud

The intentional deception made for personal gain or for damage to another party.

29

function point analysis (FPA)

A method for estimating software development proj- ects based on the number of user inputs, outputs, queries, files, and external interfaces.

30

functional testing

The portion of software testing where functional requirements are verified.