Identification (information security)/Related Articles
Jump to navigation
Jump to search
Identification (information security): The technology and act of claiming to have a given identity, such the user ID with which one logs in; it is untrusted until authenticated [e]
This article contains just a definition and optionally other subpages (such as a list of related articles), but no metadata. Create the metadata page if you want to expand this into a full article.
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Identification, authentication and credentialing [r]: Add brief definition or description
Subtopics
- User identifier [r]: Add brief definition or description
- Biometrics [r]: Add brief definition or description
- Identity theft [r]: Add brief definition or description
- Authentication (information security) [r]: Technologies and procedures used to confirm one's identification to a secure information system [e]
- Credentialing (information security) [r]: Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege [e]