Authentication Tag
A pair of bit strings associated to data to provide assurance of its authenticity. SOURCE: SP 800-38B
A pair of bit strings associated to data to provide assurance of its authenticity. SOURCE: SP 800-38B
Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures. SOURCE: SP 800-32 Ein Audit (von lat. “Anhörung”) ist eine unabhängige, formell und systematisch durchgefährte Überpräfungsmassnahme zur Feststellung von Übereinstimmungen von Managementsystemen, Prozessen, Verfahren und Produkten mit gesetzlichen, normativen oder internen Vorgaben oder zum Vergleich mit Best Practices. Quelle: www.risknet.de/wissen/glossary
Zur Durchfährung von Audits befugte Person mit auf die jeweilige Art des Audit bezogener und nachgewiesener Qualifikation. Ein Auditor hat keine direkte Verantwortung in der zu auditierenden Organisation. Quelle: www.risknet.de/wissen/glossary
Haftung gegenüber “Dritten”. Dritte können beispielsweise Aktionäre, Darlehensgeber, Kunden, Vertragspartner sein. Quelle: www.risknet.de/wissen/glossary
To confirm the identity of an entity when that identity is presented. SOURCE: SP 800-32
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. SOURCE: SP 800-53; FIPS 200 Authentication – The process of establishing confidence of authenticity. SOURCE: FIPS 201
A cryptographic checksum based on an Approved security function (also known as a Message Authentication Code (MAC)). SOURCE: FIPS 140-2
Hardware or software-based mechanisms that force users to prove their identity before accessing data on a device. SOURCE: SP 800-72
A block cipher mode of operation that can provide assurance of the authenticity and, therefore, the integrity of data. SOURCE: SP 800-38B
A well specified message exchange process that verifies possession of a token to remotely authenticate a claimant. Some authentication protocols also generate cryptographic keys that are used to protect an entire session, so that the data transferred in the session is cryptographically protected. SOURCE: SP 800-63