F Flashcards
FACL
Filesystem Access Control List
It’s a table that informs a computer’s operating system which users have access privileges to specific objects, such as files or directories. Each object has a security property that links it to its associated access control list.
FDE
Full Disk Encryption
A cybersecurity method that encrypts all data on a storage device, such as a hard drive or flash drive, to protect sensitive data at the hardware level. FDE automatically encrypts data and operating systems when written to the disk and decrypts them when read, if the user has authorization. This prevents unauthorized access to the data, even if the device is lost, stolen, or hacked.
FIM
File Integrity Management
A security process that monitors and analyzes the integrity of critical assets, including file systems, directories, databases, network devices, the OS, OS components, and software applications for signs of tampering or corruption.
FPGA
Field Programmable Gate Array
An integrated circuit that is flexible and scalable. They can be programmed and reprogrammed over time to meet new security standards, and they can implement complex algorithms and cryptographic processes to enhance cybersecurity measures. FPGAs are also known for their small form factor and low power consumption.
FRR
False Rejection Rate
The percentage of times that a system incorrectly rejects an authorized user. A metric used to measure how well a system can identify legitimate users.
FTP
File Transfer Protocol
A standard network protocol that allows users to transfer files between computers over a TCP-based network, like the internet. FTP uses a client-server model, which requires two parts: an FTP client and an FTP server.
FTPS
Secured File Transfer Protocol
A secure transfer protocol based on FTP that uses SSL or TLS for encryption.
While it is several times faster than SFTP, it is considered generally less secure.