audit trail |
1. A chronological record that reconstructs and examines the sequence of activities surrounding or leading to a specific operation, procedure, or event in a security relevant transaction from inception to final result. |
authenticate |
To confirm the identity of an entity when that identity is presented. |
authentication |
1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. |
authentication mechanism |
Hardware or software-based mechanisms that force users to prove their identity before accessing data on a device. |
authentication period |
The period between any initial authentication process and subsequent re-authentication processes during a single terminal session or during the period data is being accessed. |
authentication protocol |
1. A well specified message exchange process between a claimant and a verifier that enables the verifier to confirm the claimant’s identity. |
authenticator |
The means used to confirm the identity of a user, process, or device (e.g., user password or token). |
authenticity |
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. See authentication. |