expand for answer


To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to possible unauthorized modification in an automated information system, or establish the validity of a transmitted message. To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to unauthorized modification in an information system, or to establish the validity of a transmission.

Similar items:
(1) The accuracy, completeness and validity of information in accordance with business values and expectations. The property that data or information has not been modified or altered in an unauthorized manner. (2) A security service that allows verification that an unauthorized modification (including changes, insertions, deletions and duplications) has not occurred either maliciously or accidentally. See also data integrity. “Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity. ” (44 USC Sec. 3542)A state characterized by the assurance that modifications are not made by unauthorized users and authorized users do not make unauthorized modifications.
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. The act of identifying or verifying the eligibility of a station, originator, or individual to access specific categories of information. Typically, a measure designed to protect against fraudulent transmissions by establishing the validity of a transmission, message, station, or originator. The process of verifying or testing that the identity claimed by a subject is valid.
Data that is transferred to establish the claimed identity of an entity. Information, passed from one entity to another, used to establish the sending entity’s access rights.
A formal state transition access control security model that focuses on data integrity in an information system. In general, Biba integrity model has three goals: Prevent data modification by unauthorized subject, prevent unauthorized data modification by authorized subject, and maintain internal and external consistency. It is defined by Kenneth J. Biba. (A MITRE alumni)
(1) Freedom from undesirable events, such as malicious and accidental misuse; how well a system resists penetrations by outsiders and misuse by insiders. (2) The protection of system resources from accidental or malicious access, use, modification, destruction, or disclosure. (3) The protection of resources from damage and the protection of data against accidental or intentional disclosure to unauthorized persons or unauthorized modifications or destruction. Security concerns transcend the boundaries of an automated system.

There are no comments yet.

Authentication required

You must log in to post a comment.

Log in