- FIPS 200 A legally mandated standard that stipulates minimum security requirements for federal information and information systems. It defines a practical and flexible framework that federal agencies must follow to document and implement controls from the NIST Special Publication 800-53, which provides guidelines for selecting security controls for information systems supporting the executive agencies of the federal government. The controls are intended to safeguard all information systems except those related to national security.
- FIPS 202 FIPS 202, titled "SHA-3 Standard - Permutation-Based Hash and Extendable-Output Functions," specifies the Secure Hash Algorithm-3 (SHA-3) family of cryptographic hash functions. SHA-3 is a subset of cryptographic hash functions, including SHA3-224, SHA3-256, SHA3-384, and SHA3-512, as well as SHAKE128 and SHAKE256, which are extendable-output functions (XOFs). It is designed to provide integrity and security for digital data and is utilized as part of various security applications and protocols.
- FIPS 140-2 A US government computer security standard used to accredit cryptographic modules. The title is "Security Requirements for Cryptographic Modules", and it provides four increasing, qualitative levels of security - Level 1 to Level 4. It specifies the requirements for physically securing and role-based authentication of cryptographic modules used within security systems protecting sensitive but unclassified information. The standard is applicable to all federal agencies that use cryptographic-based security systems to protect sensitive information in computer and telecommunication systems (including voice systems).
- Fire suppression The various methods and systems designed to extinguish or prevent the spread of fire in a building or facility. These methods can be manual, like fire extinguishers and fire blankets, or automatic, like sprinkler systems or gas-based systems. These systems are particularly important in data centers or server rooms where high temperatures or fires can cause catastrophic damage.
- Firewall A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet. Firewalls are designed to prevent unauthorized access to or from private networks and can come in the form of hardware, software, or a combination of both. They are a fundamental part of network security and can perform various functions, including packet filtering, stateful inspection, proxy service, and network address translation (NAT).
- Firewall as a Service (FWaaS)A cloud-based solution that delivers firewall and other network security capabilities as a cloud service. It enables organizations to simplify their network security management by moving their security perimeter to the cloud, which can offer more flexibility, scalability, and cost-effectiveness compared to traditional on-premises firewall hardware. FWaaS typically includes features like intrusion prevention, URL filtering, and malware protection, and it is designed to protect both on-site and remote users in an increasingly decentralized IT landscape.
- Firewall Policy A set of instructions or rules that dictate how a firewall should handle inbound or outbound network traffic. The policy is often based on IP addresses, domain names, protocols, programs, ports, or specific network interfaces. The policies dictate which types of traffic are permitted and which are not, enhancing security by blocking potentially harmful traffic or specific services that should not be publicly available.
- Firmware A specialized form of software that provides low-level control for a device's specific hardware. Firmware can be found in embedded systems such as traffic lights, consumer appliances, wireless routers, and digital watches. It can also provide essential instructions for how a device communicates with other computer hardware. Unlike typical software, firmware is usually designed for a specific hardware device and is stored on non-volatile memory chips, making it persistent through reboots and power off/on cycles. Firmware updates can fix bugs, add features, and patch security vulnerabilities.
- Fiscal Year A one-year period that companies and governments use for accounting and preparing financial statements. A fiscal year is often different from a calendar year and can vary between organizations. It is used for budgeting, keeping accounts, and taxation purposes and is designed to end during a period when the operations of the company are at a low point, making it easier to compile financial and operational results.
- Flaw A weakness or a defect in a system, be it in a software, hardware component, network design, or business process. This could be a result of coding errors in software, design oversights, or configuration errors. When a flaw is discovered, it often needs to be rectified quickly to prevent exploitation that could compromise system integrity, confidentiality, or availability.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.