Authentication
Contents
- 1 Definition
- 1.1 International Definitions
- 1.2 National Definitions
- 1.2.1 Australia
- 1.2.2 Bermuda
- 1.2.3 Bolivia
- 1.2.4 Brazil
- 1.2.5 Burkina-Faso
- 1.2.6 Cameroon (Cameroun)
- 1.2.7 Canada
- 1.2.8 Czech Republic
- 1.2.9 Egypt
- 1.2.10 Eswatini
- 1.2.11 France
- 1.2.12 Georgia
- 1.2.13 Hong Kong
- 1.2.14 Germany
- 1.2.15 Italy
- 1.2.16 Kuwait
- 1.2.17 Liberia
- 1.2.18 Netherlands
- 1.2.19 Oman
- 1.2.20 Philippines
- 1.2.21 Romania
- 1.2.22 Senegal
- 1.2.23 Spain
- 1.2.24 Sri Lanka
- 1.2.25 Togo
- 1.2.26 United Kingdom
- 1.2.27 United States
- 1.3 Other definitions
- 1.4 International Standard
- 1.5 Dictionary
- 2 See also
- 3 Notes
- 4 References
Definition
International Definitions
IAEA
National Definitions
Australia
Bermuda
Bolivia
Brazil
Burkina-Faso
Cameroon (Cameroun)
Canada
Authentification: Processus ou mesure permettant de vérifier l’identité d’un utilisateur. [9]
Czech Republic
Authentication: Process of verification of subject identity. [10]
Egypt
Eswatini
France
Généralement l’authentification est précédée d’une identification qui permet à cette entité de se faire reconnaître du système par un élément dont on l’a doté. En résumé, s’identifier c’est communiquer son identité, s’authentifier c’est apporter la preuve de son identité.
Georgia
In the authentication process, a certain attribute of a user or system certifies authorized access to such systems or data, for example, a key (see public key cryptography), a smart card, a password, the user name or even biometrical traits (fingerprint). A higher security level can be achieved by the combination of different traits used for authentication.
Hong Kong
Authentication: A process or method to identify and to prove the identity of a user/party who attempts to send message or access data. [15]
Germany
Italy
Costituisce spesso una condizione per accedere ai sistemi informativi e di comunicazione. A tal fine vengono frequentemente impiegati metodi che associano vari strumenti di riconoscimento, quali dati biometrici, tesserini identificativi, password, etc.
Kuwait
Liberia
Netherlands
Oman
Philippines
Romania
Senegal
Spain
Sri Lanka
Togo
United Kingdom
United States
NIST
Other definitions
OWASP
Authentication is what happens when you log into a system. It compares your credentials (often user name and password) with a previously established known value such that the system can know that you are who you say you are. For sensitive systems, there is a trend toward using two factor authentication (2FA) which essentially means that users must supply two different secrets, usually one is a password (something they know) and the other is a pin supplied via text (verifying something they have).
International Standard
ISA-62443-*
IETF
ISO/IEC - ISO/IEC 27000:2014
Dictionary
See also
Notes
References
- Jump up ↑ IAEA - Nuclear Security Series Glossary Version 1.3 (November 2015)
- Jump up ↑ on-line glossary Stay Safe On-line
- Jump up ↑ Bermuda Cybersecurity Strategy 2018-2022
- Jump up ↑ Glosario. AGETIC: Agencia de Gobierno Electrónico y Tecnologías de la Información y Comunicación del Estado Plurinacional de Bolivia (CTIC-EPB)
- Jump up ↑ GLOSSÁRIO DE DEFESA CIVIL ESTUDOS DE RISCOS E MEDICINA DE DESASTRES, Ministério da Integração Nacional, Brazil
- Jump up ↑ CIRT-BF Glossary
- Jump up ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- Jump up ↑ Glossary - Canadian Centre for Cyber Security
- Jump up ↑ Glossaire - Centre Canadien pour la Cybersécurité
- ↑ Jump up to: 10.0 10.1 [1]
- Jump up ↑ Glossary of the National Telecom Authority (NTA), Egypt
- Jump up ↑ ESWATINI NATIONAL CYBERSECURITY STRATEGY 2020 - 2025 (2020)
- Jump up ↑ ANSSI Glossaire
- Jump up ↑ A Digital Georgia e-Georgia strategy and action plan 2014-2018
- Jump up ↑ Glossary for Information Security Terms/資訊保安詞彙表
- Jump up ↑ Bericht des Rechnungshofes: Management der IT–Sicherheit in der ¬Verwaltung ausgewählter Bundesministerien
- Jump up ↑ IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)
- Jump up ↑ Glossary Communication and Information Technology Regulatory
- Jump up ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- Jump up ↑ Cyber Security Beeld Nederland 2018
- Jump up ↑ ABDO 2017
- Jump up ↑ Handreiking Cybercrime (2012)
- Jump up ↑ Cyber Security Beeld Nederland 2016
- Jump up ↑ Begrippenlijst eID Afsprakenstelsel, 2014
- Jump up ↑ Oman CERT Glossary
- Jump up ↑ NHS Cyber security glossary
- Jump up ↑ GLOSAR de termeni din domeniul ordinii şi siguranţei publice, MINISTERUL ADMINISTRAŢIEI ŞI INTERNELOR DIRECŢIA GENERALĂ ORGANIZARE, PLANIFICARE MISIUNI ŞI RESURSE
- Jump up ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ Jump up to: 29.0 29.1 29.2 29.3 Diccionario de términos y conceptos de la Administración Electrónica, Ministerio de Hacienda y Función Pública Secretaría General Técnica, 2017
- Jump up ↑ National Centre for Cyber Security, Information Security Policy Domains #19: Glossary
- Jump up ↑ Loi n°2018-026 sur la Cybersécurité et la lutte contre la cybercrinminalité (2022)
- Jump up ↑ National Cyber Security Strategy 2016-2021
- Jump up ↑ NIST SOURCE: SP 800-53; SP 800-53A; SP 800-27; FIPS 200; SP 800-30
- Jump up ↑ OWASP Glossary
- Jump up ↑ ISA-62443 series
- Jump up ↑ RFC2828 glossary
- Jump up ↑ ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
- Jump up ↑ Cybersecurity Woordenboek 2021