passive impostor acceptance
(n.) In a biometric security system, when an impostor intentionally submits his own biometric sample and claims the identity of another enrollee (either intentionally or unintentionally) with the purpose of gaining access to a system. Passive impostor acceptance implies that the impostor successfully gains entrance into the system using the verified identity.
Compare with active impostor acceptance.
- passive-matrix display
A common type of flat-panel display consisting of a grid of horizontal and vertical wires. At the intersection of each grid is an LCD element which constitutes a single pixel, either letting light through or blocking it. A higher quality and more expensive type of display, called an active-matrix display, uses a transistor to control […]
- passive reconnaissance
(pas´iv ri-kon´&-zents) (n.) The process of collecting information about an intended target of a malicious hack without the target knowing what is occurring. Typical passive reconnaissance can include physical observation of an enterprise’s building, sorting through discarded computer equipment in an attempt to find equipment that contains data or discarded paper with usernames and passwords, […]
- passive tag
In an RFID system the transponder which contains the data to be transmitted is called an RF tag. Passive RF tags obtain operating power generated from the RF reader. They are smaller and lighter than active tags but have a shorter communication range and require a high powered reader. Passive tags are generally read-only and […]
Similar to a password it a collection of words made up of any number of characters and also contains blank spaces. Passphrases are commonly used for authentication in security programs and cryptographic systems. A passphrase is also used to authenticate both sides of a connection when pairing Bluetooth devices.
(n.) A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require […]