Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Verification
  • In authentication, used when a user claims to be a specific person; there is a one-to-one comparison between the applicant and a single profile in the authentication database. See Identification.
  • The documentation of penetration or attempts to penetrate an actual on-line system in support or in contradiction of assumptions developed during system review and analysis. (AR 380-380;) 2. The successful testing and documentation of actual on-line system penetration or attempts to penetrate the system in support or in contradiction or assumptions developed during system review and analysis which are to be included in the evaluation report. (DODD 5200. 28M;) 3. The process of comparing two levels of system specification for proper correspondence (e. g. , security policy model with top-level specifications, top-level specification with source code, or source code with object code). This process may or may not be automated. (NCSC-WA-001-85;; CSC-STD-001-83;)