Common CriteriaThe Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification. It is currently in version 3.1 revision 5. Common Criteria is a framework in which computer system users can specify their security functional and assurance requirements (SFRs and SARs respectively) in a Security Target (ST), and may be taken from (PPs).
Federal ReserveThe Federal Reserve System (often shortened to the Federal Reserve, or simply the Fed) is the central banking system of the United States. It was created on December 23, 1913, with the enactment of the Federal Reserve Act, after a series of financial panics (particularly the panic of 1907) led to the desire for central control of the monetary system in order to alleviate financial crises. Over the years, events such as the Great Depression in the 1930s and the Great Recession during the 2000s have led to the expansion of the roles and responsibilities of the Federal Reserve System.
Information securityInformation security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents.
Full-reserve bankingFull-reserve banking (also known as 100% reserve banking, or sovereign money system) is a system of banking where banks do not lend demand deposits and instead, only lend from time deposits. It differs from fractional-reserve banking, in which banks may lend funds on deposit, while fully reserved banks would be required to keep the full amount of each customer's demand deposits in cash, available for immediate withdrawal.
Fractional-reserve bankingFractional-reserve banking is the system of banking operating in almost all countries worldwide, under which banks that take deposits from the public are required to hold a proportion of their deposit liabilities in liquid assets as a reserve, and are at liberty to lend the remainder to borrowers. Bank reserves are held as cash in the bank or as balances in the bank's account at the central bank. The country's central bank determines the minimum amount that banks must hold in liquid assets, called the "reserve requirement" or "reserve ratio".
Foreign exchange reservesForeign exchange reserves (also called forex reserves or FX reserves) are cash and other reserve assets such as gold held by a central bank or other monetary authority that are primarily available to balance payments of the country, influence the foreign exchange rate of its currency, and to maintain confidence in financial markets. Reserves are held in one or more reserve currencies, nowadays mostly the United States dollar and to a lesser extent the euro.
Open market operationIn macroeconomics, an open market operation (OMO) is an activity by a central bank to give (or take) liquidity in its currency to (or from) a bank or a group of banks. The central bank can either buy or sell government bonds (or other financial assets) in the open market (this is where the name was historically derived from) or, in what is now mostly the preferred solution, enter into a repo or secured lending transaction with a commercial bank: the central bank gives the money as a deposit for a defined period and synchronously takes an eligible asset as collateral.
Computer securityComputer security, cyber security, digital security or information technology security (IT security) is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi.
Security information and event managementSecurity information and event management (SIEM) is a field within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware. Vendors sell SIEM as software, as appliances, or as managed services; these products are also used to log security data and generate reports for compliance purposes.
Mobile securityMobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern. Increasingly, users and businesses use smartphones not only to communicate, but also to plan and organize their work and private life.