Glossary
0-9
-
Two-factor authentication (2FA) is a form of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also called authentication factors) to verify your identity.
A
-
Met access control bedoelen we methodes en technologieën om de digitale toegang tot applicaties, gegevens en andere IT middelen te beveiligen en beheren.
-
Authentication is the act or process of verifying that a user, application or device is who or what he/she/it pretends to be.
-
Authentication is the act or process of verifying that a user, application or device is who or what he/she/it pretends to be.
-
The authorisation process determines what exactly a person or system is allowed to do within a file, application or system.
-
The authorisation process determines what exactly a person or system is allowed to do within a file, application or system.
C
-
A credential is a piece of information used to verify the identity of a user, device, or system. Credentials are used for authentication, a password is the most well-known variant.
-
Cyber security is the collective term for technologies, processes and methodologies that organisations apply to protect the confidentiality, integrity and availability of their computers, networks, software and data.
D
-
A digital identity is the type of identity that allows a person to identify themselves within an IT system or application. It is like an online passport that grants you access to the digital world.
E
-
An entitlement, often also called a right, permission, authorization, or privilege, grants a user permission or privileges for using a specific application, service, device, or digital content.
I
-
Identification is the act and step of making a digital identity known to a system, service provider or organization so that they know who they are dealing with.
-
The identity life cycle includes all steps of managing a user's digital identity, including the processes of creation, enablement, flow, disablement and deletion.
-
De ISO 27001 norm wordt wereldwijd erkend als de standaard op het gebied van informatiebeveiliging.
O
-
A one-time password (OTP) is a one-time code that is valid only once and is used for secure authentication.
-
A one-time password (OTP) is a one-time code that is valid only once and is used for secure authentication.
P
-
De afkorting PAM verwijst in de praktijk zowel naar Privileged Access Management als Privileged Account Management. PAM verzorgt het beheer en beveiliging van zogeheten privileged accounts; dat zijn accounts waarmee je kritische IT-beheerprocessen kunt uitvoeren, zoals het systeembeheer, netwerkbeheer, configuratiebeheer en het beheer van gevoelige gegevens.
-
Phishing is een soort internetfraude waarbij iemand zich voordoet als een betrouwbare partij om persoonlijke informatie, zoals wachtwoorden of creditcardnummers, te stelen.
-
The Principle of Least Privilege (PoLP) means that users are only given access rights to those applications and data they need to perform their tasks. Users are therefore not given more rights than strictly necessary.
-
The Principle of Least Privilege (PoLP) means that users are only given access rights to those applications and data they need to perform their tasks. Users are therefore not given more rights than strictly necessary.
-
Privacy is the right to protect your personal information and lifestyle from unauthorized access. It is about maintaining control over what others know about you and how your personal information is used.
-
Provisioning is an essential process in IT management that focuses on efficiently managing user accounts and systems within organisations.
R
-
Met role mining kun je op een iteratieve manier alle relevante gebruikersrollen en hun toegangsrechten in kaart brengen. De input van een role mining project levert je zo de noodzakelijke gegevens voor de implementatie van Role Based Access Control (RBAC) in een organisatie.
S
-
Security Assertion Markup Language
SAML stands for Security Assertion Markup Language and is one of the most widely used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users need to authenticate once after which they do not have to log in again.
-
SAML stands for Security Assertion Markup Language and is one of the most widely used standards for exchanging authentication data. SAML enables secure Single Sign-On (SSO). Users need to authenticate once after which they do not have to log in again.
-
Single Sign-On, or SSO for short, is an authentication method that allows users to only log in once to gain access to multiple applications or systems. This eliminates the need for users to remember distinct login credentials for each individual application or service.
-
Single Sign-On, or SSO for short, is an authentication method that allows users to only log in once to gain access to multiple applications or systems. This eliminates the need for users to remember distinct login credentials for each individual application or service.
-
A Single Source of Truth (SSOT), also called a core registration system, refers to a centralized and reliable data source where data and documents are recorded once, so that they are consistent, accurate and up to date for reuse in business processes via specific systems.
-
A Single Source of Truth (SSOT), also called a core registration system, refers to a centralized and reliable data source where data and documents are recorded once, so that they are consistent, accurate and up to date for reuse in business processes via specific systems.
-
Single-factor authentication is the simplest form of authentication and applies one authentication factor to verify a digital identity.
-
Single-factor authentication is the simplest form of authentication and applies one authentication factor to verify a digital identity.
-
Strong authentication is a method that uses multiple factors to verify the identity of a digital user or device.
T
-
Two-factor authentication (2FA) is a form of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also called authentication factors) to verify your identity.
Z
-
Zero Trust is a security principle where users and systems never automatically trust each other.