59 relations: Authentication, Automated teller machine, Bank card, Biometrics, Client (computing), Comparison of authentication solutions, Computer network, Credential, Credit unions in the United States, Desktop computer, Facial recognition system, Federal Financial Institutions Examination Council, Fingerprint, Fraud, Identity management, Identity theft, Iris recognition, Keystroke dynamics, Knowledge-based authentication, Laptop, Machine, Man-in-the-browser, Man-in-the-middle attack, Memory, Mobile app, Mobile phone, Mobile phone spam, Multi-factor authentication, Mutual authentication, National Institute of Standards and Technology, Online banking, Out-of-band, Passphrase, Password, Payment card industry, Personal digital assistant, Personal identification number, Phishing, Phone cloning, Radio-frequency identification, Reliance authentication, Security token, Signalling System No. 7, Smart card, SMS, Social engineering (security), Software, Software token, Speaker recognition, Strong authentication, ..., The Verge, Time-based One-time Password algorithm, Transaction authentication number, Trojan horse (computing), United States, User (computing), Virtual private network, Web page, World Wide Web. Expand index (9 more) » « Shrink index
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, transfer funds, or obtaining account information, at any time and without the need for direct interaction with bank staff.
A bank card is typically a plastic card issued by a bank to its clients that performs one or more of a number of services that relate to giving the client access to funds, either from the client's own bank account, or through a credit account.
Biometrics is the technical term for body measurements and calculations.
A client is a piece of computer hardware or software that accesses a service made available by a server.
Authentication is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.
Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.
Credit unions in the United States serve 100 million members, comprising 43.7% of the economically active population.
A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements.
A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.
The Federal Financial Institutions Examination Council (FFIEC) is a formal U.S. government interagency body composed of five banking regulators that is "empowered to prescribe uniform principles, standards, and report forms to promote uniformity in the supervision of financial institutions".
A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.
In law, fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.
Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".
Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.
Keystroke dynamics, keystroke biometrics, typing dynamics and lately typing biometrics, is the detailed timing information which describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard.
Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service such as a financial institution or website.
A laptop, also called a notebook computer or just notebook, is a small, portable personal computer with a "clamshell" form factor, having, typically, a thin LCD or LED computer screen mounted on the inside of the upper lid of the "clamshell" and an alphanumeric keyboard on the inside of the lower lid.
A machine uses power to apply forces and control movement to perform an intended action.
Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host web application.
In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Memory is the faculty of the mind by which information is encoded, stored, and retrieved.
A mobile app is a computer program designed to run on a mobile device such as a phone/tablet or watch.
A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.
Mobile phone spam is a form of spam (unsolicited messages, especially advertising), directed at the text messaging or other communications services of mobile phones or smartphones.
Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).
Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS).
The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.
Online banking, also known as internet banking, it is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website.
Out-of-band is activity outside a defined telecommunications frequency band, or, metaphorically, outside some other kind of activity.
A passphrase is a sequence of words or other text used to control access to a computer system, program or data.
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
The payment card industry (PCI) denotes the debit, credit, prepaid, e-purse, ATM, and POS cards and associated businesses.
A personal digital assistant (PDA), also known as a handheld PC, is a variety mobile device which functions as a personal information manager.
A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Phone cloning is the copying of identity from one cellular device to another.
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.
Reliance authentication is a part of the trust-based identity attribution process whereby a second entity relies upon the authentication processes put in place by a first entity.
Security tokens are physical devices used to gain access to an electronically restricted resource.
Signaling System No.
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.
SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
Computer software, or simply software, is a generic term that refers to a collection of data or computer instructions that tell the computer how to work, in contrast to the physical hardware from which the system is built, that actually performs the work.
A software token (a.k.a. soft token) is a type of two-factor authentication security device that may be used to authorize the use of computer services.
Speaker recognition is the identification of a person from characteristics of voices (voice biometrics).
Strong authentication is a notion with several unofficial definitions.
The Verge is an American technology news and media network operated by Vox Media.
The Time-based One-Time Password algorithm (TOTP) is an algorithm that computes a one-time password from a shared secret key and the current time.
A transaction authentication number (TAN) is used by some online banking services as a form of single use one-time passwords to authorize financial transactions.
In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.
The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.
A user is a person who utilizes a computer or network service.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
A web page (also written as webpage) is a document that is suitable for the World Wide Web and web browsers.
The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and accessible via the Internet.
2 factor authentication, 2 step verification, 2-factor authentication, 2-step verification, 2FA, Dual Factor Authentication, Dual factor authentication, Dual-factor authentication, Hard token, Multifactor Authentication, Multifactor authentication, Out-of-band authentication, Soft token, T-FA, Three Factor Authentication, Two Factor Authentication, Two factor, Two factor auth, Two factor authentication, Two-Factor, Two-factor, Two-factor auth, Two-factor authentication, Two-step authorization, Two-step verification.