The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
F
Forensic Examination
Forensic examination is the investigation to evaluate, analyze, organize, preserve, and document evidence, including digital evidence that helps identify the cause of an incident.
Letter for filtering (will be hidden in prod) :
F
Firmware
Firmware consists of the programs and data components of a cryptographic module that are stored in hardware within the cryptographic boundary and cannot be dynamically written or modified during execution.
Letter for filtering (will be hidden in prod) :
F
Firewall Control Proxy
A firewall control proxy is the component that controls a firewall’s handling of a call. The firewall control proxy can instruct the firewall to open specific ports that are needed by a call, and direct the firewall to close these ports at call termination.
Letter for filtering (will be hidden in prod) :
F
File Name Anomaly
File name anomaly is a mismatch between the internal file header and its external extension. A file name anomaly is also a file name inconsistent with the content of the file (e.g., renaming a graphics file with a non-graphical extension).
Letter for filtering (will be hidden in prod) :
F
Forensic Copy
Forensic copy is an accurate bit-for-bit reproduction of the information contained on an electronic device or associated media, whose validity and integrity has been verified using an accepted algorithm.
Letter for filtering (will be hidden in prod) :
F
Federal Public Key Infrastructure Policy Authority (FPKI PA)
The federal PKI policy authority is a federal government body responsible for setting, implementing, and administering policy decisions regarding interagency PKI interoperability that uses the FBCA.
Letter for filtering (will be hidden in prod) :
F
Full Disk Encryption (FDE)
Full disk encryption is the process of encrypting all the data on the hard disk drive used to boot a computer, including the computer’s operating system, and permitting access to the data only after successful authentication with the full disk encryption product.
Letter for filtering (will be hidden in prod) :
F
Freeware
Freeware is an application, program, or software available for use at no cost.
Letter for filtering (will be hidden in prod) :
F
Forward Cipher
A forward cipher is one of the two functions of the block cipher algorithm that is determined by the choice of a cryptographic key. The term “forward cipher operation” is used for TDEA, while the term “forward transformation” is used for dea.
Letter for filtering (will be hidden in prod) :
F
File Protection
File protection is the aggregate of processes and procedures designed to inhibit unauthorized access, contamination, elimination, modification, or destruction of a file or any of its contents.