Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

user

Abbreviation(s) and Synonym(s): Definition(s):

  Individual or group that interacts with a system or benefits from a system during its utilization.
Source(s):
NIST SP 800-160 [Superseded] (ISO/IEC 25010)

  Individual or (system) process authorized to access an information system.
Source(s):
FIPS 200 under USER (CNSSI 4009)
NIST SP 800-18 Rev. 1 under User (CNSSI 4009)

  An individual (person), organization, device, or process. “Party” is a synonym.
Source(s):
NIST SP 800-56A Rev. 2 under Entity
NIST SP 800-56B Rev. 1 under Entity

  An individual (person), organization, device or process. Used interchangeably with “party”.
Source(s):
NIST SP 800-102 under Entity
NIST SP 800-133 under Entity
NIST SP 800-89 under Entity

  An individual (person), organization, device or process.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Entity [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Entity

  See Entity.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under User [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under User

  Individual, or (system) process acting on behalf of an individual, authorized to access an information system. See Organizational User and Non-Organizational User.
Source(s):
NIST SP 800-53 Rev. 4 under User (CNSSI 4009 - Adapted)

  An FCKMS role that utilizes the key-management services offered by an FCKMS service provider.
Source(s):
NIST SP 800-152 under User

  Individual, or (system) process acting on behalf of an individual, authorized to access a system.
Source(s):
NIST SP 800-171 Rev. 1 (CNSSI 4009 - Adapted)

  1. Individual, or (system) process acting on behalf of an individual, authorized to access an information system.
Source(s):
CNSSI 4009-2015 (NIST SP 800-53 Rev. 4)

  2. An individual who is required to use COMSEC material in the performance of his/her official duties and who is responsible for safeguarding that COMSEC material. See hand receipt holder and local element.
Source(s):
CNSSI 4009-2015 (CNSSI 4005, NSA/CSS Manual Number 3-16 (COMSEC))

  An individual (person), organization, device or a combination thereof. “Party” is a synonym. In this Recommendation, an entity may be a functional unit that executes certain processes.
Source(s):
NIST SP 800-108 under Entity

  Individual, or (system) process acting on behalf of an individual, authorized to access an information system. [Note: With respect to SecCM, an information system user is an individual who uses the information system functions, initiates change requests, and assists with functional testing.]
Source(s):
NIST SP 800-128 under Information System User (CNSSI 4009)

  A person or entity with authorized access.
Source(s):
NIST SP 800-66 Rev. 1 under User (45 C.F.R., Sec. 164.304)

  The term user refers to an individual, group, host, domain, trusted communication channel, network address/port, another netwoik, a remote system (e.g., operations system), or a process (e.g., service or program) that accesses the network, or is accessed by it, including any entity that accesses a network support entity to perform OAM&Prelated tasks. Regardless of their role, users must be required to successfully pass an identification and authentication (I&A) mechanism. For example, I&A would be required for a security or system administrator. For customers, I&A could be required for billing purposes. For some services (e.g.. Emergency Services) a customer may not need to be authenticated by the system.
Source(s):
NIST SP 800-13 under User

  Individual, or (system) process acting on behalf of an individual, authorized to access an information system. See Organizational User and Non-Organizational User.
Source(s):
NIST SP 800-53 Rev. 4 under User (CNSSI 4009 - Adapted)

  See Information System User
Source(s):
NIST SP 800-128 under User

  A person, organization, or other entity which requests access to and uses the resources of a computer system or network.
Source(s):
NISTIR 4734 under User

  The entity, human or machine, that is identified by the userID, authenticated prior to system access, the subject of all access control decisions, and held accountable via the audit reporting system.
Source(s):
NISTIR 5153 under User

  the set of people, both trusted (e.g., administrators) and untrusted, who use the system.
Source(s):
NISTIR 6192 under User

  Person who interacts with the product.
Source(s):
NISTIR 8040 under User (ISO 9241-11:1998)

  A consumer of the services offered by an RP.
Source(s):
NISTIR 8149 under User