Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] F1-F10 functionality classes Fabrications Face recognition authentication [See also Biometrics.] Factoring large numbers 2nd Failover mode Failure 2nd Failure modes and effects analysis (FMEA) 2nd Fair Credit Reporting Act Fair information policies 2nd Fair service guarantee Fair use Fairbrother, Peter FAIS (Foreign Affairs Information System) False intrusion detection False positives Falsifying messages Fame, attack motive Fault tolerance, networks Fault tree analysis (FTA) 2nd Faults active detection definition fixing passive detection Faux environment FBI al Qaeda computer breaking WEP Computer Crime and Security Survey 2nd loss from attacks organized crime stolen laptops survey of cyberattacks value of cybersecurity Federal Educational Rights and Privacy Act Federal Trade Commission (FTC) Federated databases Felten, Edward Fence register Fences Fermat's theorem Field checks, databases Fields, databases File lock channel File names, iishack problem File protection all-none group individual permissions per-object per-user persistent permissions SUID (set userid) temporary acquired permissions Files access control [See Access control.] directory access erasing deleted 2nd Filters database reliability multilevel databases polarizing Final permutation 2nd fingerd flaw 2nd Fingerprint authentication [See also Biometrics.] Fingerprint, operating system or applications Fires Firewalls network encryption networks application proxy gateway authentication comparison of definition design guards limitations overview packet filtering gateway personal sample configuration stateful inspection types of rules set Firmware, legal issues First sale Flaws aliasing ambiguous access policies authentication boundary conditions definition domain errors exploitation examples identification incomplete mediation known vulnerabilities logic errors overview serialization time-of-check to time-of-use flaws types of typical flaws user interface vulnerability validation errors Floods Flow analysis FMEA (failure modes and effects analysis) 2nd Follett, Ken Footprints, satellite broadcast Foreign Affairs Information System (FAIS) Forgery 2nd Formal methods Formal verification Format failures Fortezza [See also Keys (encryption) escrow.] Frames, network Framing the issue Fraud Computer Fraud and Abuse Act ethical issues laws Free rides Free speech, and cryptography Freedom of Information Act Frequency probability Front end databases trusted FTA (fault tree analysis) 2nd FTC (Federal Trade Commission) Full disclosure Full plaintext attacks Functional correctness Future earnings, adjusting |