Password management Definitions

Browse Definitions
Search Definitions
  • B

    Bring Your Own Authentication (BYOA)

    Bring Your Own Authentication (BYOA) is a computing concept in which employee-owned devices are used as authentication credentials within the enterprise.

  • BYOI (bring your own identity)

    BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon.

  • C

    cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.

  • G

    graphical password or graphical user authentication (GUA)

    A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).

  • I

    identity chaos (password chaos)

    Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.

  • K

    knowledge-based authentication (KBA)

    In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password.

  • L

    logon (or login)

    In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.

  • M

    masquerade

    In general, a masquerade is a disguise.

  • O

    onboarding and offboarding

    In identity management, onboarding is the addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access privileges. Conversely, offboarding refers to the IAM processes surrounding the removal of an identity for an employee who has changed roles or left the organization.

  • one-time pad

    In cryptography, a one-time pad is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key.

  • P

    passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a message) or in an encryption or a decryption of a message.

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.

  • password hardening

    Password hardening is any one of a variety of measures taken to make it more difficult for an intruder to circumvent the authentication process. Password hardening may take the form of multifactor authentication, by adding some component to the username/password combination, or may be policy-based... (Continued)

  • password synchronization

    Password synchronization is an authentication process that coordinates user passwords across various computers and computing devices so a user only has to remember a single password instead of multiple passwords for different machines or devices.

  • S

    salt

    In password protection, salt is a random string of data used to modify a password hash.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close