Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- facial recognition (FR)"A technology for identifying specific people based on pictures or videos. It operates by analyzing features such as the structure of the face, the distance between the eyes, and the angles between a person’s eyes, nose, and mouth. It is controversial because of worries about privacy invasion,(...)
- Failure Definition: The inability of a system or component to perform its required functions within specified performance requirements.
- fair-washing"promoting the false perception that a machine learning model respects some ethical values"
- fairness (another entry for "algorithmic fairness"?)""“cultural assumptions” regarding “the regulation of [human] life effected by stated and unstated rules of interaction,” rules that most interactants see as “generally applicable” and “reasonable.” (We have to get the full definition from the book..."
- fairness metric"A quantification of unwanted bias in training data or models."
- false negative"An example in which the predictive model mistakenly classifies an item as in the negative class."
- false positive"An example in which the model mistakenly classifies an item as in the positive class"
- Family Range A family range describes the range of documents from the first Bates production number assigned to the first page of the top most parent document through the last Bates production number assigned to the last page of the last child document.
- Family Relationship A family relationship is formed among two or more documents that have a connection or relatedness because of some factor.
- fault tolerance"The ability of a system or component to continue normal operation despite the presence of hardware or software faults"
- favorable label"A label whose value corresponds to an outcome that provides an advantage to the recipient. The opposite is an unfavorable label."
- feature"An attribute containing information for predicting the label."
- feature extraction"a more general method in which one tries to develop a transformation of the input space onto the lowdimensional subspace that preserves most of the relevant information"
- feature importance"how important the feature was for the classification performance of the model; a measure of the individual contribution of the corresponding feature for a particular classifier, regardless of the shape (e.g., linear or nonlinear relationship) or direction of the feature effect"
- feature shift"Unlike joint distribution shift detection, which cannot localize which features caused the shift, we define a new hypothesis test for each feature individually. Naïvely, the simplest test would be to check if the marginal distributions have changed for each feature (as explored by [25]);(...)
- federated learning"a learning model which addresses the problem of data governance and privacy by training algorithms collaboratively without transferring the data to another location."
- feedback loop"describes the process of leveraging the output of an AI system and corresponding end-user actions in order to retrain and improve models over time. The AI-generated output (predictions or recommendations) are compared against the final decision (for example, to perform work or not) and(...)
- File Allocation Table (FAT) Where the operating system stores information about a disk's structure. The FAT is a road map, which allows a computer to save information on the disk, locate and retrieve it. Different operating systems have more or less sophisticated FAT 4 capabilities and therefore are more or less(...)
- File Extension A tag of three or four letters, preceded by a period, which identifies a data file's format or the application used to create the file. File extensions can streamline the process of locating data. For example, if one is looking for incriminating pictures stored on a computer, one might begin(...)
- File Server When several or many computers are networked together in a LAN situation, one computer may be utilized as a storage location for files for the group. File servers may be employed to store e-mail, financial data, word processing information or to back-up the network.
- File Sharing One of the key benefits of a network is the ability to share files stored on the server among several users.
- Files Groups of information collectively placed under a name and stored on the computer. Files are organized in various directories and subdirectories.
- Firewall Definition: A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
- Firewall A set of related programs that protect the resources of a private network from users from other networks.
- firmware"Computer programs and data stored in hardware - typically in read-only memory (ROM) or programmable read-only memory (PROM) - such that the programs and data cannot be dynamically written or modified during execution of the programs."