F
False Negative: A state where the presence of a threat is not detected.
False Positive: An alert that incorrectly detects the presence of a threat.
File Path: The location of a file or directory.
File Transfer Protocol (FTP): A TCP/IP protocol specifying the transfer of text or binary files across the network.
Fileless Malware: Malware that does not need to be installed by the user because it
Filesystem Hierarchy Standard (FHS): The component of the Linux OS that organizes data.
Filtering: Selecting data that match a certain condition.
Final Report: Documentation that provides a comprehensive review of an incident.
Firewall: A logical or physical discontinuity in a network to prevent unauthorized access to data or resources.
Firewall: A network security device that monitors traffic to or from your network.
Float Data: Data consisting of a number with a decimal point.
Flooding: An attack that attempts to cause a failure in (especially, in the security of) a computer system or other data processing entity by providing more input than the entity can process properly.
Foreign Key: A column in a table that is a primary key in another table.
Forward Proxy Server: A server that regulates and restricts a person’s access to the internet
Function: A section of code that can be reused in a program.
Fuzzing: The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities. Also, see “regression testing”.
« Back to Glossary Index