Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

authentication

Abbreviation(s) and Synonym(s):

Authenticate

Definition(s):

  Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s):
FIPS 200 under AUTHENTICATION
NIST SP 800-128 under Authentication (FIPS 200)
NIST SP 800-137 under Authentication (FIPS 200)
NIST SP 800-18 Rev. 1 under Authentication
NIST SP 800-30 Rev. 1 under Authentication (FIPS 200)
NIST SP 800-39 under Authentication (FIPS 200)
NIST SP 800-53 Rev. 4 under Authentication (FIPS 200)
NIST SP 800-53A Rev. 4 under Authentication (FIPS 200)
NIST SP 800-60 Vol. 1 Rev. 1 under Authentication (FIPS 200)
NIST SP 800-60 Vol. 2 Rev. 1 under Authentication (FIPS 200)
NIST SP 800-82 Rev. 2 under Authentication (NIST SP 800-53)

  The process of establishing confidence of authenticity; in this case, in the validity of a person’s identity and the PIV Card.
Source(s):
FIPS 201 under Authentication [Withdrawn]

  The process of establishing confidence in the identity of users or information systems.
Source(s):
NIST SP 800-63-2 under Authentication [Superseded]
NISTIR 8149 under Authentication (NIST SP 800-63-3)

  Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in a system.
Source(s):
NIST SP 800-12 Rev. 1 under Authentication (FIPS 200)
NIST SP 800-171 Rev. 1 (FIPS 200 - Adapted)
NIST SP 800-27 Rev. A [Withdrawn]
NIST SP 800-33
NISTIR 7316 under Authentication

  The process of verifying the authorization of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.
Source(s):
NIST SP 800-47 under Authentication

  A process that provides assurance of the source and integrity of information in communications sessions, messages, documents or stored data.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Authentication

  To confirm the identity of an entity when that identity is presented.
Source(s):
NIST SP 800-32 under Authenticate

  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s):
CNSSI 4009-2015 (FIPS 200, NIST SP 800-27 Rev. A)

  2. A security measure designed to protect a communications system against acceptance of fraudulent transmission or simulation by establishing the validity of a transmission, message, originator, or a means of verifying an individual's eligibility to receive specific categories of information.
Source(s):
CNSSI 4009-2015 (CNSSI 4005 - NSA/CSS Manual Number 3-16 (COMSEC) )

  See Authentication.
Source(s):
NIST SP 800-63-3 under Authenticate

  The process a VPN uses to limit access to protected services by forcing users to identify themselves.
Source(s):
NIST SP 800-113 under Authentication

  For the purposes of this guide, the process of verifying the identity claimed by a WiMAX device. User authentication is also an option supported by IEEE 802.16e-2005.
Source(s):
NIST SP 800-127 under Authentication

  A process that establishes the source of information, provides assurance of an entity’s identity or provides assurance of the integrity of communications sessions, messages, documents or stored data.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Authentication [Superseded]

  A process that establishes the origin of information, or determines an entity’s identity. In a general information security context: Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system [SP 800-53].
Source(s):
NIST SP 800-57 Part 2 under Authentication

  Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information.
Source(s):
NIST SP 800-59 under Authentication (CNSSI 4009)

  The corroboration that a person is the one claimed.
Source(s):
NIST SP 800-66 Rev. 1 under Authentication (45 C.F.R., Sec. 164.304)

  Provides assurance of the authenticity and, therefore, the integrity of data.
Source(s):
NIST SP 800-67 Rev. 2 under Authentication
NIST SP 800-67 Rev. 1 under Authentication [Superseded]

  Authentication is the process of verifying the claimed identity of the NE user.
Source(s):
NIST SP 800-13 under AUTHENTICATION

  Authentication is the process of verifying the claimed identity of a session requestor.
Source(s):
NIST SP 800-13 under Authentication

  Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.
Source(s):
NIST SP 800-32 under Authentication (CNSSI 4009)

  Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to a system’s resources.
Source(s):
NIST SP 800-63-3 under Authentication

  The process of verifying a claimed identity of a user, device, or other entity in a computer system
Source(s):
NISTIR 4734 under Authentication

  the process of verifying the integrity of data that has been stored, transmitted, or otherwise exposed to possible unauthorized access.
Source(s):
NISTIR 4734 under Authentication

  The process of proving the claimed identity of an individual user, machine, software component or any other entity.  Typical authentication mechanisms include conventional password schemes, biometrics devices, cryptographic methods, and onetime passwords (usually implemented with token based cards.)
Source(s):
NISTIR 5153 under Authentication

  The process of establishing confidence in the claimed identity of a user or system
Source(s):
NISTIR 7682 under Authentication

  measures the number of times an attacker must authenticate to a target in order to exploit a vulnerability.
Source(s):
NISTIR 7864 under Authentication

  measures the access an attacker requires to exploit a vulnerability.
Source(s):
NISTIR 7946 under Authentication