F

« Back to Glossary Index

False Negative: A state where the presence of a threat is not detected.

False Positive: An alert that incorrectly detects the presence of a threat.

File Path: The location of a file or directory.

File Transfer Protocol (FTP): A TCP/IP protocol specifying the transfer of text or binary files across the network.

Fileless Malware: Malware that does not need to be installed by the user because it

Filesystem Hierarchy Standard (FHS): The component of the Linux OS that organizes data.

Filtering: Selecting data that match a certain condition.

Final Report: Documentation that provides a comprehensive review of an incident.

Firewall: A logical or physical discontinuity in a network to prevent unauthorized access to data or resources.

Firewall: A network security device that monitors traffic to or from your network.

Float Data: Data consisting of a number with a decimal point.

Flooding: An attack that attempts to cause a failure in (especially, in the security of) a computer system or other data processing entity by providing more input than the entity can process properly.

Foreign Key: A column in a table that is a primary key in another table.

Forward Proxy Server: A server that regulates and restricts a person’s access to the internet

Function: A section of code that can be reused in a program.

Fuzzing: The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities. Also, see “regression testing”.

« Back to Glossary Index

Shopping Cart0

Cart