A-Z Popular New Data Security Search »
Data Security
 

What is Data Authentication?

 , updated on
Data authentication is the process of confirming the origin and integrity of data. The term is typically related to communication, messaging and integration. Data authentication has two elements: authenticating that you're getting data from the correct entity and validating the integrity of that data.

Example

An integration transaction sends a partner an authentication code encrypted with the public key in the partner's digital certificate. When the partner sends back the correct code, the partner is considered authenticated.
Any data sent over a properly authenticated and secured channel is considered authenticated. It is also a good practice to confirm data integrity at the same time. This is typically done by matching checksums. If data is somehow corrupted in transit, it can't be considered authenticated.
Overview: Data Authentication
Type
Definition
The process of confirming that data matches that of an authenticated source.
Related Concepts
Next: Non Repudiation
More about data security:
Data Anonymization
Data Breach
Data Authentication
Data Control
Data Backup
Data In Rest
Data In Use
Data Masking
Data Remanence
Data In Transit
Data Room
Data Security
Data States
Data Purging
Deanonymization
Degaussing
Data Sovereignty
Data Subject
Data Wipe
Deep Magic
Self-Destruct Mechanism
If you enjoyed this page, please consider bookmarking Simplicable.
 

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Masking vs Redaction

The difference between data masking and redaction.

Degaussing

A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Data States

An overview of the three data states.

Personal Data

Examples of the common types of personal data.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

Confidential Information

An overview of confidential information with examples.

Privacy

A comprehensive list of privacy related terms.

Human Rights

A list of human rights.

Enduring Issues

A list of enduring issues.

Social Data

An overview of social data with examples.

Hawthorne Effect

An overview of the Hawthorne effect with examples.

Social Risks

An overview of social risk with examples.

IoT Security

The unique problem of security the internet of things.

Digital Freedom

An overview of digital freedom with examples.

Individual Rights

A categorized list of individual rights.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map