Difference between revisions of "Authentication"
Jump to navigation
Jump to search
(→Georgia) |
|||
Line 5: | Line 5: | ||
===National Definitions=== | ===National Definitions=== | ||
+ | ==== [[France]] ==== | ||
+ | {{definition|L’authentification a pour but de vérifier l’identité dont une entité se réclame. <ref>[https://www.ssi.gouv.fr/entreprise/glossaire/ ANSSI Glossaire]</ref>}}Généralement l’authentification est précédée d’une identification qui permet à cette entité de se faire reconnaître du système par un élément dont on l’a doté. En résumé, s’identifier c’est communiquer son identité, s’authentifier c’est apporter la preuve de son identité. <br/><br/> | ||
+ | |||
==== [[Georgia]] ==== | ==== [[Georgia]] ==== | ||
{{definition|Authentication is the process of verifying and securing the identity of a user or a program when accessing electronically secured data and systems or when performing communication processes. <ref>[http://www.dea.gov.ge/uploads/eGeorgia%20Strategy.pdf A Digital Georgia e-Georgia strategy and action plan 2014-2018]</ref>}}In the authentication process, a certain attribute of a user or system certifies authorized access to such systems or data, for example, a key (see public key cryptography), a smart card, a password, the user name or even biometrical traits (fingerprint). A higher security level can be achieved by the combination of different traits used for authentication.<br/><br/> | {{definition|Authentication is the process of verifying and securing the identity of a user or a program when accessing electronically secured data and systems or when performing communication processes. <ref>[http://www.dea.gov.ge/uploads/eGeorgia%20Strategy.pdf A Digital Georgia e-Georgia strategy and action plan 2014-2018]</ref>}}In the authentication process, a certain attribute of a user or system certifies authorized access to such systems or data, for example, a key (see public key cryptography), a smart card, a password, the user name or even biometrical traits (fingerprint). A higher security level can be achieved by the combination of different traits used for authentication.<br/><br/> | ||
Line 29: | Line 32: | ||
==References== | ==References== | ||
[[Category:Information]][[Category:Security]] | [[Category:Information]][[Category:Security]] | ||
− | {{#set:defined by=IAEA|defined by=ISO|defined by=Georgia|defined by=Oman|defined by=United States|defined by=NIST|defined by=IETF}} | + | {{#set:defined by=IAEA|defined by=ISO|defined by=France|defined by=Georgia|defined by=Oman|defined by=United States|defined by=NIST|defined by=IETF}} |
Revision as of 00:45, 31 December 2016
Contents
Definition
International Definitions
IAEA
Authentication is the provision of assurance that a claimed characteristic of an entity is correct. [1]
National Definitions
France
L’authentification a pour but de vérifier l’identité dont une entité se réclame. [2]
Généralement l’authentification est précédée d’une identification qui permet à cette entité de se faire reconnaître du système par un élément dont on l’a doté. En résumé, s’identifier c’est communiquer son identité, s’authentifier c’est apporter la preuve de son identité.
Georgia
Authentication is the process of verifying and securing the identity of a user or a program when accessing electronically secured data and systems or when performing communication processes. [3]
In the authentication process, a certain attribute of a user or system certifies authorized access to such systems or data, for example, a key (see public key cryptography), a smart card, a password, the user name or even biometrical traits (fingerprint). A higher security level can be achieved by the combination of different traits used for authentication.
Oman
Authentication is the process of confirming the correctness of the claimed identity. [4]
United States
NIST
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. [5]
International Standard
IETF
Authentication: The process of verifying an identity claimed by or for a system entity. [6]
ISO/IEC
Authentication is a process that is used to confirm that a claimed characteristic of an entity is actually correct. To authenticate is to verify that a characteristic or attribute that appears to be true is in fact true. [7]
See also
Notes
- ↑ IAEA - Nuclear Security Series Glossary Version 1.3 (November 2015)
- ↑ ANSSI Glossaire
- ↑ A Digital Georgia e-Georgia strategy and action plan 2014-2018
- ↑ Oman CERT Glossary
- ↑ NIST SOURCE: SP 800-53; SP 800-53A; SP 800-27; FIPS 200; SP 800-30
- ↑ RFC2828 glossary
- ↑ ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary