Definition: Authenticity is an IT non-functional requirement that ensures that the information or data presented is genuine and trustworthy. It is essential to maintain the integrity of the system and prevent unauthorized access or tampering of data. Authenticity can be achieved through various methods such as encryption, digital signatures, and access control mechanisms. It is crucial for systems that handle sensitive information, such as financial transactions, medical records, or legal documents, to ensure authenticity to maintain the trust of users and stakeholders.
Source: TOGAF
Source reference: https://pubs.opengroup.org/architecture/togaf9-doc/arch/chap03.html
Additional information: According to the TOGAF specification, Authenticity is a non-functional requirement that refers to the ability of a system to ensure that the information or data being processed or transmitted is genuine and has not been tampered with or altered in any way. This requirement is essential for systems that deal with sensitive or confidential information, such as financial transactions, personal data, or medical records.
To meet the Authenticity requirement, the system must implement appropriate security measures, such as encryption, digital signatures, or access controls, to prevent unauthorized access, modification, or deletion of data. The system must also ensure that the data is accurate, complete, and consistent, and that it can be traced back to its original source.
Furthermore, the system must provide mechanisms for detecting and reporting any attempts to tamper with the data, such as intrusion detection systems or audit logs. It must also have procedures in place for responding to security incidents, such as notifying the appropriate authorities or taking corrective actions to prevent further damage.
Overall, the Authenticity requirement is critical for ensuring the integrity and trustworthiness of the system and the data it processes. It is a key component of a comprehensive security strategy and must be carefully considered and implemented to meet the needs of the organization and its stakeholders.
Example: One example of the IT non-functional requirement 'Authenticity' could be ensuring that only authorized users have access to sensitive data or systems. This can be achieved through various authentication methods such as passwords, biometrics, or two-factor authentication. The system should also be able to detect and prevent unauthorized access attempts.
LOST view: Digital Solution Non-Functional Requirements Catalogue view
Identifier: http://data.europa.eu/dr8/egovera/AuthenticityRequirement
EIRA traceability: eira:DigitalSolutionNonFunctionalRequirementRequirement
ABB name: egovera:AuthenticityRequirement
EIRA concept: eira:ArchitectureBuildingBlock
Last modification: 2023-05-16
dct:identifier: http://data.europa.eu/dr8/egovera/AuthenticityRequirement
dct:title: Authenticity Non-Functional Requirement
|
|
dct:modified | 2024-01-28 |
dct:identifier | http://data.europa.eu/dr8/AuthenticityRequirement |
dct:title | Authenticity Non-Functional Requirement |
skos:example | One example of the IT non-functional requirement 'Authenticity' could be ensuring that only authorized users have access to sensitive data or systems. This can be achieved through various authentication methods such as passwords, biometrics, or two-factor authentication. The system should also be able to detect and prevent unauthorized access attempts. |
skos:definition | Authenticity is an IT non-functional requirement that ensures that the information or data presented is genuine and trustworthy. It is essential to maintain the integrity of the system and prevent unauthorized access or tampering of data. Authenticity can be achieved through various methods such as encryption, digital signatures, and access control mechanisms. It is crucial for systems that handle sensitive information, such as financial transactions, medical records, or legal documents, to ensure authenticity to maintain the trust of users and stakeholders. |
eira:concept | eira:ArchitectureBuildingBlock |
eira:definitionSource | TOGAF |
eira:definitionSourceReference | https://pubs.opengroup.org/architecture/togaf9-doc/arch/chap03.html |
skos:note | According to the TOGAF specification, Authenticity is a non-functional requirement that refers to the ability of a system to ensure that the information or data being processed or transmitted is genuine and has not been tampered with or altered in any way. This requirement is essential for systems that deal with sensitive or confidential information, such as financial transactions, personal data, or medical records.
To meet the Authenticity requirement, the system must implement appropriate security measures, such as encryption, digital signatures, or access controls, to prevent unauthorized access, modification, or deletion of data. The system must also ensure that the data is accurate, complete, and consistent, and that it can be traced back to its original source.
Furthermore, the system must provide mechanisms for detecting and reporting any attempts to tamper with the data, such as intrusion detection systems or audit logs. It must also have procedures in place for responding to security incidents, such as notifying the appropriate authorities or taking corrective actions to prevent further damage.
Overall, the Authenticity requirement is critical for ensuring the integrity and trustworthiness of the system and the data it processes. It is a key component of a comprehensive security strategy and must be carefully considered and implemented to meet the needs of the organization and its stakeholders. |
eira:PURI | http://data.europa.eu/dr8/AuthenticityRequirement |
dct:type | eira:AuthenticityRequirement |
eira:view | Digital Solution Non-Functional Requirements Catalogue view |
eira:eifLayer | N/A |
skos:broader | http://data.europa.eu/dr8/DigitalSolutionNonFunctionalRequirementRequirement |