expand for answer

Authentication

Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. The act of identifying or verifying the eligibility of a station, originator, or individual to access specific categories of information. Typically, a measure designed to protect against fraudulent transmissions by establishing the validity of a transmission, message, station, or originator. The process of verifying or testing that the identity claimed by a subject is valid.


Similar items:
A method for ensuring a recipient that a message truly came from the claimed sender and that the message was not altered while in transit between the sender and recipient. Cryptographic process used to assure message originator authenticity, integrity, and nonrepudiation. Synonymous with electronic signature. The act of electronically affixing an encrypted message digest to a computer file or message in which the originator is then authenticated to the recipient.
[view]
Concept of processing information with different classifications and categories that simultaneously permits access by users with different security clearances and denies access to users who lack authorization. (. See cross domain solution. )Concept of processing information with different classifications and categories that simultaneously permits access by users with different security clearances, but prevents users from obtaining access to information for which they lack authorization.
[view]
(1) Capability for data transmission in only one direction at a time between a sending station and a receiving station. (2) A circuit designed for data transmission in both directions but not at the same time.
[view]
Difference between the minimum clearance or authorization of information system users and the maximum sensitivity (e. g. ; classification and categories) of data processed by the system. The disparity between the minimum clearance or authorization of system users and the maximum sensitivity (e. g. , classification and categories) of data processed by a system.
[view]
To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to possible unauthorized modification in an automated information system, or establish the validity of a transmitted message. To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to unauthorized modification in an information system, or to establish the validity of a transmission.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in