Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

Authentication

Acronym(s):

None

Definition(s):

  The process of establishing confidence of authenticity; in this case, in the validity of a person’s identity and the PIV Card.
Source(s): FIPS 201-2

  Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s): FIPS 200
CNSSI 4009-2015 (FIPS 200, NIST SP 800-27 Rev. A)
NIST SP 800-128 (FIPS 200)
NIST SP 800-137 (FIPS 200)
NIST SP 800-146
NIST SP 800-171 (Updates to version published June 2015) (FIPS 200)
NIST SP 800-18 Rev. 1
NIST SP 800-39 (FIPS 200)
NIST SP 800-53 Rev. 4 (FIPS 200)
NIST SP 800-60 Vol 1 Rev. 1 (FIPS 200)
NIST SP 800-30 (FIPS 200)
NIST SP 800-53A Rev. 4 (FIPS 200)
NIST SP 800-82 Rev. 2 (NIST SP 800-53)

  A security measure designed to protect a communications system against acceptance of fraudulent transmission or simulation by establishing the validity of a transmission, message, originator, or a means of verifying an individual's eligibility to receive specific categories of information.
Source(s): CNSSI 4009-2015 (CNSSI 4005, NSA/CSS Manual Number 3-16 (COMSEC))

  The process a VPN uses to limit access to protected services by forcing users to identify themselves.
Source(s): NIST SP 800-113

  For the purposes of this guide, the process of verifying the identity claimed by a WiMAX device. User authentication is also an option supported by IEEE 802.16e-2005.
Source(s): NIST SP 800-127

  A process that establishes the origin of information or determines an entity’s identity.
Source(s): NIST SP 800-21 Second edition (NIST SP 800-57)

  Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in a system.
Source(s): NIST SP 800-27 Rev. A
NIST SP 800-33

  Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.
Source(s): NIST SP 800-32 (CNSSI 4009)

  The process of verifying the authorization of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.
Source(s): NIST SP 800-47

  A process that establishes the source of information, provides assurance of an entity’s identity or provides assurance of the integrity of communications sessions, messages, documents or stored data.
Source(s): NIST SP 800-57 Part 1 Rev. 3

  A process that establishes the origin of information, or determines an entity’s identity. In a general information security context: Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s): NIST SP 800-57 Part 2 (NIST SP 800-53)

  A process that establishes the origin of information, or determines an entity’s identity.
Source(s): NIST SP 800-57 Part 3 Rev. 1

  The process of establishing confidence in the identity of users or information systems.
Source(s): NIST SP 800-63-2

  The corroboration that a person is the one claimed.
Source(s): NIST SP 800-66 Rev. 1 (45 C.F.R., Sec. 164.304)

  Used by an AP or STA to verify the identity of another STA.
Source(s): NIST SP 800-97

  Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.
Source(s): NIST SP 800-59 (CNSSI 4009)

  Provides assurance of the authenticity and, therefore, the integrity of data.
Source(s): NIST SP 800-67 Rev. 1

Synonym(s):

None

See Also:
Access Authentication
Additional Authentication Data
Authentication And Key Management
Authentication Chain
Authentication Code
Authentication Credentials
Authentication Framework
Authentication Header
Authentication Header (IPv6 extension header)
Authentication Header Protocol
Authentication Key
Authentication Mechanism
Authentication Method
Authentication Period
Authentication Protocol
Authentication Protocol Run
Authentication Protocols
Authentication Secret
Authentication Server
Authentication Service
Authentication Tag
Authentication Tagtag
Authentication, Authorization And Accounting
Authentication, Authorization, And Accounting
Authentication, Authorization, And Accounting Key
Card Authentication Key
Challenge And Reply Authentication
Challenge Handshake Authentication Protocol
Challenge-Handshake Authentication Protocol
Cipher Block Chaining Message Authentication Code
Cipher Block Chaining-Message Authentication Code
Cipher-Based Message Authentication Code
Counter Mode with Cipher Block Chaining Message Authentication Code
Counter Mode with Cipher Block Chaining Message Authentication Protocol
Counter with Cipher Block Chaining-Message Authentication Code
Data Origin Authentication
Deauthentication
Domain-Based Message Authentication, Reporting & Conformance
Dynamic Authentication
e- authentication
E-Authentication Assurance Level
Electronic Authentication
Entity Authentication
Extensible Authentication Protocol
Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
Extensible Authentication Protocol Over LAN
Extensible Authentication Protocol Over LAN Key Confirmation Key
Extensible Authentication Protocol Over LAN Key Encryption Key
Extensible Authentication Protocol-Transport Layer Security
Extensible Authentication Protocol-Tunneled Transport Layer Security
Galois Message Authentication Code
Graphical Identification And Authentication
Hash Message Authentication Code
Hash-Based Message Authentication Code
Hashed Message Authentication Code
Identification And Authentication
Identification And Authentication (NIST SP 800-53 security control family)
Identity-Based Authentication
Implicit Key Authentication
Keyed Hash-Based Message Authentication Code
Keyed-Hash Message Authentication Code
Keyed-Hash Message Authentication Code (as Specified In Fips 198-1.)
Knowledge Based Authentication
Knowledge-based authentication
Message Authentication
Message Authentication Code
Message Authentication Code (MAC)
Message Authentication Codemac Algorithm
Message Authentication Key
Microsoft Challenge Handshake Authentication Protocol
Microsoft Challenge-Handshake Authentication Protocol
Multifactor Authentication
Multiple Factor Authentication
Mutual Authentication
Origin Authentication
Password Authentication Protocol
Peer Entity Authentication
Peer Entity Authentication Service
PKI-Card Authentication Key
PKI-PIV Authentication Key
Pre-Boot Authentication
Protected Extensible Authentication Protocol
Remote Authentication Dial In User Service
Remote Authentication Dial-In User Server
Remote Authentication Dial-In User Service
Role-Based Authentication
SAML authentication assertation
Source Authentication
Static Authentication
Strong Authentication
Tunneled Authentication Method
Unilateral Authentication
Universal Authentication Framework