Glossary: F -TEISS® : Cracking Cyber Security

Glossary / Glossary: F

Glossary: F

1-10  a  b  c  d  e  f  g  h  i  j  k  l  m  n  o  p  q  r  s  t  u  v  w  x  y  

False negative An alert that incorrectly indicates that no unauthorised activity is occurring in an IT system and that there is nothing to worry about
False positive An alert that incorrectly indicates that unauthorised activity is occurring in an IT system; false positives are the equivalent of “crying wolf” and if too many of them are received from a security system, the recipient is likely to discount any information from the system
Fileless malware Malicious software that doesn’t use files to launch an attack, instead running in the RAM of a computer, making it impossible for normal anti-virus software to detect
File-sharing The ability of many different users to access the same file at the same time. These programs are often used to illegally access intellectual property such as films, music and software
Firewall A system that prevents unauthorised access to or from a com­puter system; an essential method of keeping a network perimeter secure but one that is useless once intruders are inside a network
Flaming Strongly worded reproofs on the internet aimed at people who are somehow deemed to have offended against netiquette (qv)
Flooding A cyber attack that causes a failure in a computer or system by providing more input, such as a large volume of data requests, than it can effectively process. See also Denial of Service Attack
Forensic discovery The search and analysis of electronic documents and data. Elec­tronic discovery is frequently distinguished from traditional “paper discovery”. Forensic discovery may be required in legal proceed­ings following a data breach
Forensics In cyber security, the process of analysing an attack (qv) and data connected to an attack for legal, insurance and repair purposes
Form grabber Malicious software that harvests the data you are inputting into an online form before it is sent over the internet, thus avoiding the protection afforded by a secure HTTPS (qv) connection

Get the latest cyber news in your inbox

Join our community of cyber professionals today!