A control failure that results all accesses blocked.
A control failure that results in all accesses permitted.
A failure mode where, if a hardware or software failure is detected, the system automatically transfers processing to a hot backup component, such as a clustered server.
A failure mode where, if a hardware or software failure is detected, program execution is terminated, and the system is protected from compromise.
A failure mode where, if a hardware or software failure is detected, certain, noncritical processing is terminated, and the computer or network continues to function in a degraded mode.
In biometric access control systems, the percentage of unauthorized users that are incorrectly granted access. See also CER, FRR.
Momentary loss of electric power.
A system that continues to operate following failure of a computer or network component.
A star topology token-passing network transport protocol.
More serious crimes that normally result in jail/prison terms of more than one year. See also Misdemeanor.
Federal Information Processing Standard.
A device or program that controls traffic flow between networks.
Program or code that is stored in ROM memory.
The science of conducting a computer crime investigation to determine what has happened, who is responsible, and collecting legally admissible evidence for use in a computer crime case.
A packet-switched network protocol used to transport WAN communications.
Any deceptive or misrepresented activity that results in illicit personal gain.
In biometric access control systems, the percentage of authorized users who are incorrectly denied access. See also CER, FAR.
An artificial intelligence method that is used to address uncertain situations to determine whether a given condition is true or false.