1: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(New page: ==Footnote 1= For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More spe...)
 
m (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
==Footnote 1=
==Footnote 1==
For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication).
For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication).

Latest revision as of 12:40, 16 October 2014

Footnote 1

For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, authentication involves determining its source and providing assurance that the message has not been modified or replaced in transit. See Guideline 28 (authentication).