(1) The process of comparing two levels of system specification for proper correspondence (e.g., security policy models with top-level specification, top-level specification with source code, or source code with object code). (2) The process of evaluating a system or component (including software) to determine whether the products of a given development process satisfy the requirements imposed at the start of that process. This process may or may not be automated. (3) The process of affirming that a claimed identity is correct by comparing the offered claims of identity with previously proven information stored in the identity card.
A subscriber name that has been verified by identity proofing.
(1) An entity that verifies the authenticity of a digital signature using the public key. (2) An entity that verifies the claimant’s identity by verifying the claimant’s possession of a token using an authentication protocol. To do this, the verifier may also need to validate credentials that link the token and identity and check their status. A verifier includes the functions necessary for engaging in authentication exchanges.
A scenario where an attacker impersonates the verifier in an authentication protocol, usually to capture information (e.g., password) that can be used to masquerade as that claimant to the real verifier.
It is a change to a baseline configuration item that modifies its functional capabilities. As functional capabilities are added to, modified within, or deleted from a baseline configuration item, its version identifier changes. Note that baselining is first and versioning is next.
A new release of commercial software reflecting major changes made in functions.
A mechanism that allows distinct versions of an object to be identified and associated with independent attributes in a well-defined manner.
The process of identifying the service application and application version in use.
A machine or a person that is attacked.
The process of encrypting a container, which can hold many files and folders, and permitting access to the data within the container only after proper authentication is provided. A container is a file encompassing and protecting other files.
A network configuration in which frames are broadcast within the VLAN and routed between VLANs. VLANs separate the logical topology of the LANs from their physical topology.
Software that allows a single host to run one or more guest operating systems.
A network that appears to be a single protected network behind firewalls, which actually encompasses encrypted virtual links over untrusted networks.
A password computed from a passphrase that meets the requirements of password storage.
A virtual private network (VPN) tailored specifically for dial-up access.