Authentication Tag
A pair of bit strings associated to data to provide assurance of its authenticity. SOURCE: SP 800-38B
A pair of bit strings associated to data to provide assurance of its authenticity. SOURCE: SP 800-38B
A well specified message exchange process that verifies possession of a token to remotely authenticate a claimant. Some authentication protocols also generate cryptographic keys that are used to protect an entire session, so that the data transferred in the session is cryptographically protected. SOURCE: SP 800-63
A block cipher mode of operation that can provide assurance of the authenticity and, therefore, the integrity of data. SOURCE: SP 800-38B
Hardware or software-based mechanisms that force users to prove their identity before accessing data on a device. SOURCE: SP 800-72
A cryptographic checksum based on an Approved security function (also known as a Message Authentication Code (MAC)). SOURCE: FIPS 140-2
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. SOURCE: SP 800-53; FIPS 200 Authentication – The process of establishing confidence of authenticity. SOURCE: FIPS 201
To confirm the identity of an entity when that identity is presented. SOURCE: SP 800-32
Haftung gegenüber “Dritten”. Dritte können beispielsweise Aktionäre, Darlehensgeber, Kunden, Vertragspartner sein. Quelle: www.risknet.de/wissen/glossary
Zur Durchfährung von Audits befugte Person mit auf die jeweilige Art des Audit bezogener und nachgewiesener Qualifikation. Ein Auditor hat keine direkte Verantwortung in der zu auditierenden Organisation. Quelle: www.risknet.de/wissen/glossary
Authentication information conveyed during an authentication exchange. SOURCE: FIPS 196