JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
F
Face scanning
Face Time
Facilities
Facilities Planning
Facility
Facility Management
Facsimile
Facsimile Converter
Facsimile Recorder
Facsimile Transmission
Factor
Fail
Fail Safe
Fail Soft
Fail-Safe Operation
Failure
Failure Access
Failure Control
Fair Credit Billing Act of 1974 (amended 1986)
Fall Over
Fall Through
False acceptance rate (FAR)
False alarm
False negative
False positive
False rejection rate (FRR[AuQ2][AuQ2])
Fan
Fandango On Core
FAQ
FAQ List
FAQL
FAR (false acceptance rate)
Faradize
Farkled
Farming
Fat Electrons
Fault
Fault Tolerance
Faulty
FAX
Fax Security
FCA
Fd Leak
FDDI
FDDI-2
FDIU
FDM
Fear And Loathing
Feature
Feature Creature
Feature Key
Feature Shock
Featurectomy
Features
FEC
Federal
Federal Agency
Federal Computer Criminals
Federal Computer System
Federal Data Processing Centers
Federal Information Processing Standards
Federal Managers Financial Integrity Act
Federal Property And Administrative Service Act
Federal Property And Administrative Services Act Of 1949
Federal Records Act
Federal Register
Federal Telecommunications Fund
Federal Trade Commission (FTC)
Federal Wiretap Act
Feep
Feeper
Feeping Creature
Feeping Creaturism
Fence
Fencepost Error
Fepped Out
FER
Fetch Protection
Fiber Distributed Data Interface
Fiber Optics
Fiber Pigtail
FidoNet
Field
Field Circus
Field Servoid
Fielded Equipment
FIFO
File
File Attach
File Authentication Code
File integrity checkers
File Management System
File Protection
File Request
File Security
File Signature
File Transfer Protocol
File Transfer, Access, And Management
File-infector viruses
Fill
Fill Device
Film At 11
Filter
Filtered Power
FIN
Finagle's Law
Final Evaluation Report
Financial Management Information
Financial Management System
Fine
Finger
Finger Trouble
Finger-Pointing Syndrome
Fingerprint recognition
Fingerprint Signal
Fingerprinting
Finn
FIPS
FIPS PUB
FIPS PUB 39
Fire Prevention And Protection
Firebottle
Firefighting
FIREFLY
Firehose Syndrome
Firewall
Firewall appliances
Firewall architecture
Firewall Code
Firewall Machine
FireWall-1
Firmware
Firmware Security
Firmy
First-In First-Out
FISA (Foreign Intelligence Surveillance Act)
FISH Queue
FISINT
FITNR
Five-Year Plan
Fix
Fixed COMSEC Facility
Fixed Storage
FIXME
Flag
Flag Day
Flag Sequence
Flaky
Flame
Flame On
Flame War
Flamer
Flap
Flash viruses
Flat
Flat-ASCII
Flat-File
Flatten
Flavor
Flavorful
Flaw
Flaw Hypothesis
Flaw Hypothesis Methodology
Flexible Disk
Flippy
Flood
Flooding DoS attacks
Floppy Disk
Flow Control
Flow Control Procedure
Flow Diagram
Flowchart
Flower Key
Flush
Flux
Flypage
Flyspeck 3
Flytrap
FOAF
FOCI
FOI
FOIA
Fold Case
Followup
Follow-up report
Fontology
Foonly
Footprint
For Free
For Official Use Only (FOUO) Data
For The Rest Of Us
For Values Of
Fora
Foreground
Foreign Government Information
Foreign Intelligence Service
Foreign Intelligence Surveillance Act (FISA)
Forensics
Fork Bomb
Forked
Formal Access
Formal Access Approval
Formal Cryptographic Access (FCA)
Formal Development Methodology (FDM)
Formal Methods For Security Design
Formal Proof
Formal Security Policy
Formal Security Policy Model
Formal Top-Level
Formal Top-Level Specification
Formal Verification
Format
Formerly Restricted Data
Formulary
Fortrash
Fortuitous Conduction
Fortuitous Conductor
Fortune Cookie
Forum
Forward Error Correction
Fossil
FOT&E
FOUO
Four-Color Glossies
Fourth Amendment
Four-way close
FQR
FQT
Fragile
Fragment offset
Fragmentation
Frame
Fraud
Fraud Or Abuse
Fraud, Waste And Abuse
FRD
Frednet
FreeBSD
Freedom Of Information Act
Freeware
Freeze
Frequency
Frequency Hopping
Frequency Of Major Failure
Fried
Friendly
Frink
Friode
Fritterware
Frob
Frobnicate
Frobnitz
Front End
Front-End Processing
Front-End Processor
Front-End Security
Front-End Security Filter
Frotz
Frotzed
Frowney
FRR (false rejection rate)
Fry
FSD
FSRS
FSTS
FTAM
FTC (Federal Trade Commission)
FTLS
F-T-P
FTS
FUBAR
FUD Wars
Fudge Factor
Fuel Up
Full backup
Full Bit Emanation
Full Financial Disclosure
Full Maintenance
Full Monty, The
Full protocol decoding
Functional Testing
Funds
Funky
Funny Money
Fuzz
Fuzzball
Fourth Amendment
Part of the U.S. Constitution that protects people against unreasonable searches and seizures and that requires probable cause to undertake searches and the limiting of searches.