Biometric Template Protection — bezeichnet eine Klasse von Verfahren zum Schutz der Merkmalsdaten bei der biometrischen Personenerkennung. Anders als bei herkömmlichen biometrischen Erkennungsverfahren werden bei Biometric Template Protection die in der Einlernphase (Enrolment) … Deutsch Wikipedia
Biometric passport — A biometric passport is a combined paper and electronic identity document that uses biometrics to authenticate the identity of travelers. The passport s critical information is stored on a tiny RFID computer chip, much like information stored on… … Wikipedia
Full disk encryption — (or whole disk encryption) is a kind of disk encryption software or hardware which encrypts every bit of data that goes on a disk or disk volume. The term full disk encryption is often used to signify that everything on a disk, including the… … Wikipedia
Disk encryption — uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term full disk encryption (or whole disk encryption) is often used to… … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
Premier Election Solutions — Industry Electronic Voting hardware Consulting Founded Ohio (January 22, 2002) Headquarters North Canton, Ohio, United States Products AccuVote TSX, AccuVote OS, AccuView Printer Module, Global Election Manageme … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Pre-boot authentication — (PBA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper proof environment external to the operating system as a trusted authentication layer. The PBA prevents anything being read from the hard disk such as the… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Radio-frequency identification — (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from… … Wikipedia
Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the … Wikipedia