Certificate-based authentication

Certificate-based authentication: A digital identification process used to verify the identity of a client or server through a digital certificate. This approach ensures authenticity and prevents spoofing or man-in-the-middle attacks by validating the identity via a trusted Certificate Authority. It is commonly employed in secure environments due to its robustness and support for two-factor and […]

Challenge Handshake Authentication Protocol (CHAP)

Challenge Handshake Authentication Protocol (CHAP): A network authentication protocol where the server challenges a client to prove its identity. The server sends a unique challenge string, and the client responds with a value obtained by hashing the challenge with its password. If the values match, authentication is successful. CHAP provides more security than password-based authentication […]

Challenge/Response Token

Challenge/Response Token: A security token or device that produces a response code used in authentication processes. When presented with a challenge, such as a numeric code or a nonce provided by the authentication system, the token generates a corresponding response based on a secret key or algorithm. This response is then used to verify the […]

Challenge-response authentication

Challenge-response authentication: A method of authentication in which a server presents a question or challenge to a user or system seeking access, who must then provide a valid answer or response. This type of authentication is often used in scenarios where passwords alone are deemed insufficiently secure. The challenge is typically a random number, and […]

Capability Table

Capability Table: A security tool used in certain computer systems to define the access rights a certain user, process or a piece of software has over specific resources in the system. The table lists out the objects and the corresponding actions that can be performed on those objects, providing a comprehensive view of what is […]

Card Swipe

Card Swipe: The action of reading the magnetic stripe of a card, such as a credit or debit card, through a card reader device. Card swipe technology is utilized to facilitate electronic transactions by securely transferring cardholder information to a point-of-sale (POS) system. Security measures are integral to card swipe systems to protect against fraud […]