Difference between revisions of "Authentication"
(→United Kingdom) |
(→Bermuda) |
||
(13 intermediate revisions by the same user not shown) | |||
Line 6: | Line 6: | ||
===National Definitions=== | ===National Definitions=== | ||
====[[Australia]] ==== | ====[[Australia]] ==== | ||
− | {{definition|Authentication: The process of verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system. <ref>[https://www.staysmartonline.gov.au/glossary on-line glossary Stay Safe On-line]</ref>}}<br /><br/> | + | {{definition|Authentication: The process of verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system. <ref>[https://www.staysmartonline.gov.au/glossary on-line glossary Stay Safe On-line]</ref>}}<br/> |
+ | ====[[Bermuda]]==== | ||
+ | {{definition|Authentication: the process or action of verifying the identity of a user or proces <ref>[https://www.gov.bm/sites/default/files/10999-National-Cybersecurity-Strategy.pdf Bermuda Cybersecurity Strategy 2018-2022]</ref>}}<br/> | ||
+ | |||
====[[Bolivia]] ==== | ====[[Bolivia]] ==== | ||
{{definition|Autenticación: Característica que permite identificar y validar la identidad de un usuario, servicio, proceso. <ref>[https://www.ctic.gob.bo/glosario/ Glosario. AGETIC: Agencia de Gobierno Electrónico y Tecnologías de la Información y Comunicación del Estado Plurinacional de Bolivia (CTIC-EPB)]</ref>}}<br /><br/> | {{definition|Autenticación: Característica que permite identificar y validar la identidad de un usuario, servicio, proceso. <ref>[https://www.ctic.gob.bo/glosario/ Glosario. AGETIC: Agencia de Gobierno Electrónico y Tecnologías de la Información y Comunicación del Estado Plurinacional de Bolivia (CTIC-EPB)]</ref>}}<br /><br/> | ||
Line 13: | Line 16: | ||
==== [[Burkina-Faso]] ==== | ==== [[Burkina-Faso]] ==== | ||
− | {{definition|Authentification: Identification d’un utilisateur et vérification de ses droits d’accès aux services d’un système informatique. Deux niveaux sont possibles : authentification simple utilisant une seule méthode d’identification généralement basée sur une preuve mentale (mot de passe par exemple) et authentification forte utilisant au moins deux méthodes d’identification: une preuve mentale et une preuve dynamique (carte à puce par exemple). <ref>[http://www.cirt.bf/index.php/referentiel/glossaire-2/ CIRT-BF Glossary]</ref>}}<br /><br/> | + | {{definition|Authentification: Identification d’un utilisateur et vérification de ses droits d’accès aux services d’un système informatique. Deux niveaux sont possibles : authentification simple utilisant une seule méthode d’identification généralement basée sur une preuve mentale (mot de passe par exemple) et authentification forte utilisant au moins deux méthodes d’identification: une preuve mentale et une preuve dynamique (carte à puce par exemple). <ref>[http://www.cirt.bf/index.php/referentiel/glossaire-2/ CIRT-BF Glossary]</ref>}}<br/><br/> |
+ | ==== [[Cameroon]] (Cameroun) ==== | ||
+ | {{definition|Authentification : critère de sécurité défini par un processus mis en œuvre notamment pour vérifier l’identité d’une personne physique ou morale et s’assurer que l’identité fournie correspond à l’identité de cette personne préalablement enregistrée. <ref>[https://www.unodc.org/res/cld/document/cmr/2010/loi_sur_la_cybersecurite_et_la_cybercriminalite_html/Loi_2010-012_cybersecurite_cybercriminalite.pdf LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN]</ref>}}<br/><br/> | ||
==== [[Canada]] ==== | ==== [[Canada]] ==== | ||
{{definition|Authentication: A process or measure used to verify a users identity. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - Canadian Centre for Cyber Security]</ref><br/><br/>Authentification: Processus ou mesure permettant de vérifier l’identité d’un utilisateur. <ref>[https://www.cyber.gc.ca/fr/glossaire Glossaire - Centre Canadien pour la Cybersécurité]</ref>}} | {{definition|Authentication: A process or measure used to verify a users identity. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - Canadian Centre for Cyber Security]</ref><br/><br/>Authentification: Processus ou mesure permettant de vérifier l’identité d’un utilisateur. <ref>[https://www.cyber.gc.ca/fr/glossaire Glossaire - Centre Canadien pour la Cybersécurité]</ref>}} | ||
<br/><br/> | <br/><br/> | ||
+ | ====[[Czech Republic]]==== | ||
+ | {{definition|Autentizace: Proces ověření identity subjektu. <ref name=CZglos>[https://www.govcert.cz/download/slovnik/vykladovy_slovnik_KB_2_vydani.pdf]</ref><br/><br/>Authentication: Process of verification of subject identity. <ref name=CZglos>[https://www.govcert.cz/download/slovnik/vykladovy_slovnik_KB_2_vydani.pdf]</ref>}} | ||
+ | <br /> | ||
====[[Egypt]] ==== | ====[[Egypt]] ==== | ||
− | {{definition|Authentication: [Any] Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s eligibility to receive specific categories of information. <ref>[http://old.tra.gov.eg/glossary/a.pdf Glossary of the National Telecom Authority (NTA), Egypt]</ref>}}<br /><br/> | + | {{definition|Authentication: [Any] Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s eligibility to receive specific categories of information. <ref>[http://old.tra.gov.eg/glossary/a.pdf Glossary of the National Telecom Authority (NTA), Egypt]</ref>}}<br/> |
+ | ====[[Eswatini]]==== | ||
+ | {{definition|Authntication: The process of verifying the identity or other attributes of a user, process or device. <ref>[https://ncsirt.org.sz/wp-content/uploads/2021/06/Eswatini-NCS-2020.pdf ESWATINI NATIONAL CYBERSECURITY STRATEGY 2020 - 2025 (2020)]</ref>}}<br/> | ||
==== [[France]] ==== | ==== [[France]] ==== | ||
Line 28: | Line 38: | ||
==== [[Hong Kong]] ==== | ==== [[Hong Kong]] ==== | ||
{{definition| 認證 : 用以辨識及證明嘗試發出信息或接達數據的用戶╱一方身份的 程序或方法。信息認證指用以證明特定資訊的完整性的程序。 <br/><br/>Authentication: A process or method to identify and to prove the identity of a user/party who attempts to send message or access data. <ref>[https://www.infosec.gov.hk/english/glossary/files/InfoSecGlossary_eng.pdf Glossary for Information Security Terms/資訊保安詞彙表] </ref>}}<br/><br/> | {{definition| 認證 : 用以辨識及證明嘗試發出信息或接達數據的用戶╱一方身份的 程序或方法。信息認證指用以證明特定資訊的完整性的程序。 <br/><br/>Authentication: A process or method to identify and to prove the identity of a user/party who attempts to send message or access data. <ref>[https://www.infosec.gov.hk/english/glossary/files/InfoSecGlossary_eng.pdf Glossary for Information Security Terms/資訊保安詞彙表] </ref>}}<br/><br/> | ||
+ | ==== [[Germany]]==== | ||
+ | {{definition|Authentifizierung: Die Authentifizierung ist die Überprüfung der behaupteten Authentizität <ref>[https://www.rechnungshof.gv.at/rh/home/home/Bund2021_31_IT_Sicherheit.pdf Bericht des Rechnungshofes: Management der IT–Sicherheit in der ¬Verwaltung ausgewählter Bundesministerien]</ref>}}<br/> | ||
==== [[Italy]] ==== | ==== [[Italy]] ==== | ||
Line 61: | Line 73: | ||
==== [[United Kingdom]]==== | ==== [[United Kingdom]]==== | ||
− | {{definition|Authentication: the process of verifying the identity, or other attributes of a user, process or device. <ref>[https://www.octf.gov.uk/OCTF/media/OCTF/images/publications/Cybercrime/national_cyber_security_strategy-2016-2021.pdf National Cyber Security Strategy 2016-2021]</ref>}} | + | {{definition|Authentication: the process of verifying the identity, or other attributes of a user, process or device. <ref>[https://www.octf.gov.uk/OCTF/media/OCTF/images/publications/Cybercrime/national_cyber_security_strategy-2016-2021.pdf National Cyber Security Strategy 2016-2021]</ref>}} |
− | |||
− | |||
− | |||
− | |||
==== [[United States]]==== | ==== [[United States]]==== | ||
===== [[NIST]]===== | ===== [[NIST]]===== | ||
Line 81: | Line 89: | ||
{{definition|Authentication is a process that is used to confirm that a claimed characteristic of an entity is actually correct. To authenticate is to verify that a characteristic or attribute that appears to be true is in fact true. <ref> [http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=63411 ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary]</ref>}}<br /> | {{definition|Authentication is a process that is used to confirm that a claimed characteristic of an entity is actually correct. To authenticate is to verify that a characteristic or attribute that appears to be true is in fact true. <ref> [http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=63411 ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary]</ref>}}<br /> | ||
+ | === [[Dictionary]]=== | ||
+ | {{definition|Attributie: Duiden dat een bepaalde organisatie of groep aanvallers een aanval heeft uitgevoerd of dat heeft proberen te doen. <ref>[https://www.cybersecurityalliantie.nl/ecp_images/2021/12/Cybersecurity-Woordenboek-2021_ZonderSpreads.pdf Cybersecurity Woordenboek 2021]</ref>}}<br/><br/> | ||
+ | {{#set:defined by=Dictionary}} | ||
==See also== | ==See also== | ||
* [[Authenticity]] | * [[Authenticity]] | ||
==Notes== | ==Notes== | ||
+ | ==References== | ||
<references /> | <references /> | ||
− | |||
− | |||
[[Category:Information]][[Category:Security]] | [[Category:Information]][[Category:Security]] | ||
− | {{#set:defined by=IAEA|defined by=ISO|defined by=Australia|defined by=Bolivia|defined by=Brazil|defined by=Burkina-Faso|defined by=Canada|defined by=Egypt|defined by=France|defined by=Georgia|defined by=Hong Kong|defined by=Italy|defined by=Kuwait|defined by=Liberia|defined by=Netherlands|defined by=Oman|defined by= Philippines|defined by=Romania|defined by=Senegal|defined by=Spain|defined by=Sri Lanka|defined by=United Kingdom|defined by=United States|defined by=NIST|defined by=IETF|defined by=OWASP|defined by=ISA}} | + | {{#set:defined by=IAEA|defined by=ISO|defined by=Australia|defined by=Bermuda|defined by=Bolivia|defined by=Brazil|defined by=Burkina-Faso|defined by=Bermuda|defined by=Cameroon|defined by=Cameroun|defined by=Canada|defined by=Czech Republic|defined by=Egypt|defined by=Eswatini|defined by=France|defined by=Georgia|defined by=Germany|defined by=Hong Kong|defined by=Italy|defined by=Kuwait|defined by=Liberia|defined by=Netherlands|defined by=Oman|defined by=Philippines|defined by=Romania|defined by=Senegal|defined by=Spain|defined by=Sri Lanka|defined by=United Kingdom|defined by=United States|defined by=NIST|defined by=IETF|defined by=OWASP|defined by=ISA}} |
{{#set: Showmainpage=Yes}} | {{#set: Showmainpage=Yes}} |
Latest revision as of 17:07, 15 August 2022
Contents
- 1 Definition
- 1.1 International Definitions
- 1.2 National Definitions
- 1.2.1 Australia
- 1.2.2 Bermuda
- 1.2.3 Bolivia
- 1.2.4 Brazil
- 1.2.5 Burkina-Faso
- 1.2.6 Cameroon (Cameroun)
- 1.2.7 Canada
- 1.2.8 Czech Republic
- 1.2.9 Egypt
- 1.2.10 Eswatini
- 1.2.11 France
- 1.2.12 Georgia
- 1.2.13 Hong Kong
- 1.2.14 Germany
- 1.2.15 Italy
- 1.2.16 Kuwait
- 1.2.17 Liberia
- 1.2.18 Netherlands
- 1.2.19 Oman
- 1.2.20 Philippines
- 1.2.21 Romania
- 1.2.22 Senegal
- 1.2.23 Spain
- 1.2.24 Sri Lanka
- 1.2.25 United Kingdom
- 1.2.26 United States
- 1.3 Other definitions
- 1.4 International Standard
- 1.5 Dictionary
- 2 See also
- 3 Notes
- 4 References
Definition
International Definitions
IAEA
National Definitions
Australia
Bermuda
Bolivia
Brazil
Burkina-Faso
Cameroon (Cameroun)
Canada
Authentification: Processus ou mesure permettant de vérifier l’identité d’un utilisateur. [9]
Czech Republic
Authentication: Process of verification of subject identity. [10]
Egypt
Eswatini
France
Généralement l’authentification est précédée d’une identification qui permet à cette entité de se faire reconnaître du système par un élément dont on l’a doté. En résumé, s’identifier c’est communiquer son identité, s’authentifier c’est apporter la preuve de son identité.
Georgia
In the authentication process, a certain attribute of a user or system certifies authorized access to such systems or data, for example, a key (see public key cryptography), a smart card, a password, the user name or even biometrical traits (fingerprint). A higher security level can be achieved by the combination of different traits used for authentication.
Hong Kong
Authentication: A process or method to identify and to prove the identity of a user/party who attempts to send message or access data. [15]
Germany
Italy
Costituisce spesso una condizione per accedere ai sistemi informativi e di comunicazione. A tal fine vengono frequentemente impiegati metodi che associano vari strumenti di riconoscimento, quali dati biometrici, tesserini identificativi, password, etc.
Kuwait
Liberia
Netherlands
Oman
Philippines
Romania
Senegal
Spain
Sri Lanka
United Kingdom
United States
NIST
Other definitions
OWASP
Authentication is what happens when you log into a system. It compares your credentials (often user name and password) with a previously established known value such that the system can know that you are who you say you are. For sensitive systems, there is a trend toward using two factor authentication (2FA) which essentially means that users must supply two different secrets, usually one is a password (something they know) and the other is a pin supplied via text (verifying something they have).
International Standard
ISA-62443-*
IETF
ISO/IEC - ISO/IEC 27000:2014
Dictionary
See also
Notes
References
- ↑ IAEA - Nuclear Security Series Glossary Version 1.3 (November 2015)
- ↑ on-line glossary Stay Safe On-line
- ↑ Bermuda Cybersecurity Strategy 2018-2022
- ↑ Glosario. AGETIC: Agencia de Gobierno Electrónico y Tecnologías de la Información y Comunicación del Estado Plurinacional de Bolivia (CTIC-EPB)
- ↑ GLOSSÁRIO DE DEFESA CIVIL ESTUDOS DE RISCOS E MEDICINA DE DESASTRES, Ministério da Integração Nacional, Brazil
- ↑ CIRT-BF Glossary
- ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- ↑ Glossary - Canadian Centre for Cyber Security
- ↑ Glossaire - Centre Canadien pour la Cybersécurité
- ↑ 10.0 10.1 [1]
- ↑ Glossary of the National Telecom Authority (NTA), Egypt
- ↑ ESWATINI NATIONAL CYBERSECURITY STRATEGY 2020 - 2025 (2020)
- ↑ ANSSI Glossaire
- ↑ A Digital Georgia e-Georgia strategy and action plan 2014-2018
- ↑ Glossary for Information Security Terms/資訊保安詞彙表
- ↑ Bericht des Rechnungshofes: Management der IT–Sicherheit in der ¬Verwaltung ausgewählter Bundesministerien
- ↑ IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)
- ↑ Glossary Communication and Information Technology Regulatory
- ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ Cyber Security Beeld Nederland 2018
- ↑ ABDO 2017
- ↑ Handreiking Cybercrime (2012)
- ↑ Cyber Security Beeld Nederland 2016
- ↑ Begrippenlijst eID Afsprakenstelsel, 2014
- ↑ Oman CERT Glossary
- ↑ NHS Cyber security glossary
- ↑ GLOSAR de termeni din domeniul ordinii şi siguranţei publice, MINISTERUL ADMINISTRAŢIEI ŞI INTERNELOR DIRECŢIA GENERALĂ ORGANIZARE, PLANIFICARE MISIUNI ŞI RESURSE
- ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ 29.0 29.1 29.2 29.3 Diccionario de términos y conceptos de la Administración Electrónica, Ministerio de Hacienda y Función Pública Secretaría General Técnica, 2017
- ↑ National Centre for Cyber Security, Information Security Policy Domains #19: Glossary
- ↑ National Cyber Security Strategy 2016-2021
- ↑ NIST SOURCE: SP 800-53; SP 800-53A; SP 800-27; FIPS 200; SP 800-30
- ↑ OWASP Glossary
- ↑ ISA-62443 series
- ↑ RFC2828 glossary
- ↑ ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
- ↑ Cybersecurity Woordenboek 2021