authentication - Glossary | CSRC (2024)

Definitions:

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Sources:
FIPS 200 under AUTHENTICATION
NIST SP 1800-10B under Authentication from FIPS 200
NIST SP 1800-21C under Authenticate
NIST SP 800-128 under Authentication from FIPS 200
NIST SP 800-137 under Authentication from FIPS 200
NIST SP 800-18 Rev. 1 under Authentication
NIST SP 800-30 Rev. 1 under Authentication from FIPS 200
NIST SP 800-39 under Authentication from FIPS 200
NIST SP 800-60 Vol. 1 Rev. 1 under Authentication from FIPS 200
NIST SP 800-60 Vol. 2 Rev. 1 under Authentication from FIPS 200

The process of establishing confidence of authenticity; in this case, the validity of a person’s identity and an authenticator (e.g., PIV Card or derived PIV credential).
Sources:
FIPS 201-3 under Authentication

A security measure designed to protect a communications system against acceptance of fraudulent transmission or simulation by establishing the validity of a transmission, message, originator, or a means of verifying an individual's eligibility to receive specific categories of information.
Sources:
CNSSI 4009-2015 from CNSSI 4005, NSA/CSS Manual Number 3-16 (COMSEC)

Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories ofinformation.
Sources:
NIST SP 800-59 under Authentication from CNSSI 4009

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in a system.
Sources:
NIST SP 800-12 Rev. 1 under Authentication from FIPS 200
NIST SP 800-128 from FIPS 200
NIST SP 800-171r3 from FIPS 200 - adapted
NIST SP 800-172 from FIPS 200 - Adapted
NIST SP 800-172A from FIPS 200 - Adapted
NIST SP 800-37 Rev. 2 from FIPS 200
NIST SP 800-53 Rev. 5 from FIPS 200
NISTIR 7316 under Authentication

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Sources:
CNSSI 4009-2015 from FIPS 200
NIST SP 800-82r3 from FIPS 200

The process a VPN uses to limit access to protected services by forcing users to identify themselves.
Sources:
NIST SP 800-113 under Authentication

See Authentication.
Sources:
NIST SP 800-63-3 under Authenticate

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to a system’s resources.
Sources:
NIST SP 1800-16B under Authentication from NIST SP 800-63-3
NIST SP 1800-16C under Authentication from NIST SP 800-63-3
NIST SP 1800-16D under Authentication from NIST SP 800-63-3
NIST SP 1800-17c under Authentication
NIST SP 800-63-3 under Authentication

Provides assurance of the authenticity and, therefore, the integrity of data.
Sources:
NIST SP 800-67 Rev. 2 under Authentication

A process that provides assurance of the source and integrity of information in communications sessions, messages, documents or stored data or that provides assurance of the identity of an entity interacting with a system.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Authentication

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to a system’s resources
Sources:
NIST SP 1800-17b under Authentication

The process of establishing confidence of authenticity. In this case, it is the validity of a person’s identity and the PIV Card.
Sources:
NIST SP 1800-12b

A process that provides assurance of the source and integrity of information that is communicated or stored or the identity of an entity interacting with a system.
Sources:
NIST SP 800-175B Rev. 1 under Authentication

Note that in common practice, the term "authentication" is used to mean either source or identity authentication only. This document will differentiate the multiple uses of the word by the terms source authentication, identity authentication, or integrity authentication, where appropriate.
Sources:
NIST SP 800-175B Rev. 1 under Authentication

A process that provides assurance of the source and integrity of information in communications sessions, messages, documents or stored data or that provides assurance of the identity of an entity interacting with a system. See Source authentication, Identity authentication, and Integrity authentication.
Sources:
NIST SP 800-57 Part 1 Rev. 5 under Authentication

The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Sources:
NIST SP 1800-27B under Authentication from FIPS 200
NIST SP 1800-27C under Authentication from FIPS 200

The act of verifying that the subject has been authorized to use the presented identifier by a trusted identity provider organization.
Sources:
NIST SP 800-162

The corroboration that a person is the one claimed.
Sources:
NIST SP 800-66r2 from HIPAA Security Rule - §164.304

As used in this document, a process that provides assurance of the source and integrity of information that is communicated or stored, or that provides assurance of an entity’s identity.
Sources:
NIST SP 800-175A

The process of establishing confidence in the identity of users or information systems.
Sources:
NISTIR 8149 under Authentication from NIST SP 800-63-3

The process of verifying a claimed identity of a user, device, or other entity in a computer system
Sources:
NISTIR 4734 under Authentication

the process of verifying the integrity of data that has been stored, transmitted, or otherwise exposed to possible unauthorized access.
Sources:
NISTIR 4734 under Authentication

The process of proving the claimed identity of an individual user, machine, software component or any other entity. Typical authentication mechanisms include conventional password schemes, biometrics devices, cryptographic methods, and onetime passwords (usually implemented with token based cards.)
Sources:
NISTIR 5153 under Authentication

The process of establishing confidence in the claimed identity of a user or system
Sources:
NISTIR 7682 under Authentication

Verifying the identity of a user, process, or device, often as a prerequisite for allowing access to resources in an information system.
Sources:
NISTIR 8301 under Authentication from FIPS 200

measures the number of times an attacker must authenticate to a target in order to exploit a vulnerability.
Sources:
NISTIR 7864 under Authentication
NISTIR 7946 under Authentication

authentication - Glossary | CSRC (2024)
Top Articles
How to find Complete List of Stocks Listed in the Indian Stock Market?
Compare Current Refinance Rates
Camera instructions (NEW)
Jackerman Mothers Warmth Part 3
Craigslist Cars Augusta Ga
Jennifer Hart Facebook
Davante Adams Wikipedia
Google Jobs Denver
Caroline Cps.powerschool.com
Klustron 9
Buying risk?
Mlb Ballpark Pal
Craigslist Motorcycles Orange County Ca
“In my day, you were butch or you were femme”
Spartanburg County Detention Facility - Annex I
charleston cars & trucks - by owner - craigslist
How pharmacies can help
Morristown Daily Record Obituary
What Is Vioc On Credit Card Statement
MLB power rankings: Red-hot Chicago Cubs power into September, NL wild-card race
Culver's Flavor Of The Day Taylor Dr
Dcf Training Number
Morse Road Bmv Hours
Academy Sports Meridian Ms
Myql Loan Login
Mineral Wells Skyward
Urbfsdreamgirl
Jamielizzz Leaked
Tottenham Blog Aggregator
Craftsman Yt3000 Oil Capacity
Mawal Gameroom Download
Earthy Fuel Crossword
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Cbs Trade Value Chart Week 10
Save on Games, Flamingo, Toys Games & Novelties
A Man Called Otto Showtimes Near Carolina Mall Cinema
Wow Quest Encroaching Heat
Goodwill Houston Select Stores Photos
ATM Near Me | Find The Nearest ATM Location | ATM Locator NL
Muziq Najm
Instafeet Login
Unifi Vlan Only Network
Is The Nun Based On a True Story?
Search All of Craigslist: A Comprehensive Guide - First Republic Craigslist
Fwpd Activity Log
How to Print Tables in R with Examples Using table()
Carteret County Busted Paper
Pulaski County Ky Mugshots Busted Newspaper
Grizzly Expiration Date Chart 2023
Concentrix + Webhelp devient Concentrix
Compete My Workforce
Saw X (2023) | Film, Trailer, Kritik
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 6269

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.