From CISO Marketplace — the hub for security professionals Visit

Identity & Access Terms

55 terms

Access Control

Restricting system/resources access to authorized users only.

Access Control List (ACL)

Network security rules governing resource access permissions to protect sensitive data.

Adaptive Authentication

Authentication processes that modify security requirements in real time based on user behavior and risk levels.

Adaptive Risk Scoring

The dynamic evaluation of user and system behaviors to assign real-time risk scores for access decisions.

Anomaly-Based Access Review

Periodic evaluation of access rights triggered by deviations from normal behavior patterns.

Authentication

Verifying user identity through passwords, biometrics, or security tokens to grant system access.

Behavioral Biometric Analysis

Security based on unique user behavior patterns.

Behavioral Credential Verification

Using behavioral patterns as an additional factor to verify the identity of a user during authentication.

Biometric Spoofing Countermeasures

Technologies developed to detect and prevent fraudulent attempts to bypass biometric security systems.

Blockchain Identity Layer

Identity management protocol layer.

Blockchain-Based Identity Management

Using blockchain technology to create secure, decentralized digital identity systems.

Certificate-Based Authentication

SSL/TLS verification method using digital certificates for secure access.

Common Access Card (CAC)

DoD-issued smart card enabling PKI authentication for system access.

Credential Stuffing Prevention

Techniques to block large-scale automated login attempts using compromised credentials.

Data Subject Verification

Validation of privacy rights requestors.

Decentralized Access Control

A distributed approach to granting and managing access rights across systems without a central authority.

Decentralized Identity Management

Self-sovereign identity systems on blockchain.

Decentralized Identity Standard

Protocol for blockchain identity.

Digital Identity Assurance

Techniques and technologies that verify the authenticity and integrity of digital identities.

Dynamic Credential Rotation

Regularly updating credentials automatically to minimize the risk of long-term exposure.

Gesture Authentication System

Security using gesture recognition.

Identity Access Governance

Managing access rights.

Identity Access Review Process

Procedure for checking access rights.

Identity Access Risk Score

Measuring risks associated with access rights.

Identity Attack Pattern

Common methods of attacking authentication.

Identity Attack Response Plan

Procedure for handling authentication attacks.

Identity Attack Surface

Authentication-related vulnerabilities and exposures.

Identity Attack Surface Mapping

Documenting authentication vulnerabilities.

Identity Attack Surface Reduction

Minimizing authentication vulnerabilities.

Identity Attack Vector Analysis

Studying authentication vulnerabilities.

Identity Compromise Detection

Identifying stolen credentials.

Identity Federation Security

Securing single sign-on and identity sharing across multiple systems without compromising privacy.

Identity Governance and Administration

Framework for managing digital identities and access rights across an organization.

Identity Governance Framework

Structure for managing digital identities.

Identity Lifecycle Analytics

Analysis of user identity changes over time.

Identity Proofing

The process of verifying a person's identity when they register for or request access to a system.

Identity Protection Framework

Structure for identity security.

Identity Protection Level

Degree of identity security implementation.

Identity Risk Assessment Framework

Structure for evaluating identity risks.

Identity-First Security

A security approach that puts identity at the center of security architecture.

Multi-Factor Authentication (MFA)

Layered verification combining passwords, tokens, or biometrics.

Multi-Factor Authentication Evolution

The next wave of layered authentication techniques that go beyond traditional factors for enhanced security.

Next-Generation Biometric Security

Advanced biometric systems that leverage emerging technologies to provide robust authentication.

Risk-Adaptive Access Control

A dynamic access control system that adjusts user permissions in real time based on assessed risk.

Risk-Based Access Control

Granting system access based on continuously evaluated risk factors rather than static rules.

Risk-Based Authentication Flow

Dynamic authentication based on risk factors.

Secure Access Management

The practice of ensuring appropriate access levels across an organization's resources.

Single Sign-On (SSO) Hardening

Strengthening SSO implementations to ensure robust protection against unauthorized access.

Smart Contract Access Control

Permission management for contracts.

Synthetic Identity Fraud

AI-generated fake personas combining real and fabricated data to bypass authentication systems.

User and Entity Behavior Analytics (UEBA)

The process of tracking user and system behavior to detect anomalies that indicate a security risk.

Voice Authentication Protocol

Security system using voice recognition.

Web3 Authentication Protocol

Blockchain-based identity verification.

Web3 Identity Verification

Blockchain-based identity validation.

Zero Trust Network Access

A security framework requiring all users to be authenticated and authorized before accessing network resources.