Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

Authenticity

Acronym(s):

None

Definition(s):

  The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.
Source(s): CNSSI 4009-2015 (NIST SP 800-53 Rev. 4, NIST SP 800-53A Rev. 1, NIST SP 800-39)
NIST SP 800-137 (CNSSI 4009)
NIST SP 800-60 Vol 1 Rev. 1
NIST SP 800-30 (CNSSI 4009)

  The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. See authentication.
Source(s): NIST SP 800-18 Rev. 1
NIST SP 800-53 Rev. 4
NIST SP 800-39
NIST SP 800-53A Rev. 4

  The property that data originated from its purported source.
Source(s): NIST SP 800-63-2
NIST SP 800-38B
NIST SP 800-38C
NIST SP 800-38D

  The property that data originated from its purported source. In the context of a key-wrap algorithm, the source of authentic data is an entity with access to an implementation of the authenticated-encryption function with the KEK.
Source(s): NIST SP 800-38F

Synonym(s):
Authentication
  The process of establishing confidence of authenticity; in this case, in the validity of a person’s identity and the PIV Card.
Source(s): FIPS 201-2   Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s): FIPS 200 CNSSI 4009-2015 NIST SP 800-128 NIST SP 800-137 NIST SP 800-146 NIST SP 800-171 NIST SP 800-18 Rev. 1 NIST SP 800-39 NIST SP 800-53 Rev. 4 NIST SP 800-60 Vol 1 Rev. 1 NIST SP 800-30 NIST SP 800-53A Rev. 4 NIST SP 800-82 Rev. 2   A security measure designed to protect a communications system against acceptance of fraudulent transmission or simulation by establishing the validity of a transmission, message, originator, or a means of verifying an individual's eligibility to receive specific categories of information.
Source(s): CNSSI 4009-2015   The process a VPN uses to limit access to protected services by forcing users to identify themselves.
Source(s): NIST SP 800-113   For the purposes of this guide, the process of verifying the identity claimed by a WiMAX device. User authentication is also an option supported by IEEE 802.16e-2005.
Source(s): NIST SP 800-127   A process that establishes the origin of information or determines an entity’s identity.
Source(s): NIST SP 800-21 Second edition   Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in a system.
Source(s): NIST SP 800-27 Rev. A NIST SP 800-33   Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.
Source(s): NIST SP 800-32   The process of verifying the authorization of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.
Source(s): NIST SP 800-47   A process that establishes the source of information, provides assurance of an entity’s identity or provides assurance of the integrity of communications sessions, messages, documents or stored data.
Source(s): NIST SP 800-57 Part 1 Rev. 3   A process that establishes the origin of information, or determines an entity’s identity. In a general information security context: Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s): NIST SP 800-57 Part 2   A process that establishes the origin of information, or determines an entity’s identity.
Source(s): NIST SP 800-57 Part 3 Rev. 1   The process of establishing confidence in the identity of users or information systems.
Source(s): NIST SP 800-63-2   The corroboration that a person is the one claimed.
Source(s): NIST SP 800-66 Rev. 1   Used by an AP or STA to verify the identity of another STA.
Source(s): NIST SP 800-97   Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.
Source(s): NIST SP 800-59   Provides assurance of the authenticity and, therefore, the integrity of data.
Source(s): NIST SP 800-67 Rev. 1
See Also:

None