{"id":990593,"date":"2025-10-12T10:33:57","date_gmt":"2025-10-12T07:33:57","guid":{"rendered":"https:\/\/gpss.ro\/security-guide\/cartea-alba-de-securitate-2016-003-metode-de-autentificare-miercuri-11-ianuarie-2017-095600-am-cet-in-ultimul-8\/"},"modified":"2025-10-12T12:59:13","modified_gmt":"2025-10-12T09:59:13","slug":"cartea-alba-de-securitate-2016-003-metode-de-autentificare-miercuri-11-ianuarie-2017-095600-am-cet-in-ultimul-8","status":"publish","type":"security_advisory","link":"https:\/\/delve.ro\/ro\/security-guide\/cartea-alba-de-securitate-2016-003-metode-de-autentificare-miercuri-11-ianuarie-2017-095600-am-cet-in-ultimul-8\/","title":{"rendered":"Security White Paper 2016-003 &#8211; Authentication Methods\n                            \n                            Wednesday, January 11, 2017 09:56:00 AM CET\n                            Lately, protecting data has become increasingly difficult task. Cyber-attacks have become one of the most serious threats to any organization. Companies and organizations are taking measures in order to defend their assets, and the authentication methods are an increasingly important security measure.Authentication is the security term for verifying that the user is indeed who he claims to be. The procedure of confirming a user\u2019s authenticity, is the action of comparing the provided credentials of the user against an existing database of validated identities.However, since depending only on the use of simple credentials \u2013 or a single method of authentication in general \u2013 have lately proven to be highly unreliable, the use of multiple factors for the authentication process is highly recommended."},"content":{"rendered":"<div class=\"gpss-language-switcher\" style=\"margin-bottom: 20px; padding: 15px; background: #f0f9ff; border-left: 4px solid #3b82f6; border-radius: 8px;\">\n            <div style=\"display: flex; align-items: center; justify-content: space-between; flex-wrap: wrap; gap: 10px;\">\n                <div style=\"display: flex; align-items: center; gap: 10px;\">\n                    <span style=\"font-weight: 600; color: #1e40af;\">\ud83c\udf0d Limb\u0103 \/ Language:<\/span>\n                    <button onclick=\"switchLanguage('en')\" id=\"btn-lang-en\" class=\"lang-btn lang-btn-active\" style=\"padding: 8px 16px; background: #3b82f6; color: white; border: none; border-radius: 6px; cursor: pointer; font-weight: 600; transition: all 0.3s;\">\n                        \ud83c\uddec\ud83c\udde7 English (Original)\n                    <\/button>\n                    <button onclick=\"switchLanguage('ro')\" id=\"btn-lang-ro\" class=\"lang-btn\" style=\"padding: 8px 16px; background: #e5e7eb; color: #374151; border: none; border-radius: 6px; cursor: pointer; font-weight: 600; transition: all 0.3s;\">\n                        \ud83c\uddf7\ud83c\uddf4 Rom\u00e2n\u0103\n                    <\/button>\n                <\/div>\n                <small style=\"color: #6b7280; font-style: italic;\">Traducere automat\u0103 \/ Automatic translation<\/small>\n            <\/div>\n        <\/div>\n\n        <div id=\"content-en\" class=\"lang-content\" style=\"display: block;\">\n            <div class=\"article-content\">CERT-EU security guidance: Security White Paper 2016-003 - Authentication Methods\n                            \n                            Wednesday, January 11, 2017 09:56:00 AM CET\n                            Lately, protecting data has become increasingly difficult task. Cyber-attacks have become one of the most serious threats to any organization. Companies and organizations are taking measures in order to defend their assets, and the authentication methods are an increasingly important security measure.Authentication is the security term for verifying that the user is indeed who he claims to be. The procedure of confirming a user\u2019s authenticity, is the action of comparing the provided credentials of the user against an existing database of validated identities.However, since depending only on the use of simple credentials \u2013 or a single method of authentication in general \u2013 have lately proven to be highly unreliable, the use of multiple factors for the authentication process is highly recommended.<\/div>\n        <\/div>\n\n        <div id=\"content-ro\" class=\"lang-content\" style=\"display: none;\">\n            <div class=\"article-content\"><?xml encoding=\"UTF-8\"><p>Ghid de securitate Cert-UE: Securitate Alb&#259; 2016-003-Metode de autentificare\n                            \n                            Miercuri, 11 ianuarie 2017 09:56:00 AM CET\n                            &Icirc;n ultimul timp, protejarea datelor a devenit o sarcin&#259; din ce &icirc;n ce mai dificil&#259;. Atacurile cibernetice au devenit una dintre cele mai grave amenin&#539;&#259;ri pentru orice organiza&#539;ie. Companiile &#537;i organiza&#539;iile iau m&#259;suri pentru a -&#537;i ap&#259;ra activele, iar metodele de autentificare sunt o m&#259;sur&#259; de securitate din ce &icirc;n ce mai important&#259;. Autentificarea este termenul de securitate pentru verificarea faptului c&#259; utilizatorul este &icirc;ntr -adev&#259;r cine pretinde c&#259; este. Procedura de confirmare a autenticit&#259;&#539;ii unui utilizator este ac&#539;iunea de a compara acredit&#259;rile furnizate ale utilizatorului cu o baz&#259; de date existent&#259; de identit&#259;&#539;i validate. Cu toate acestea, &icirc;n func&#539;ie de utilizarea acredit&#259;&#539;ilor simple - sau a unei singure metode de autentificare &icirc;n general - s -a dovedit &icirc;n ultimul timp extrem de nesigur, utilizarea mai multor factori pentru procesul de autentificare este foarte recomandat.<\/p><\/div>\n        <\/div>\n\n        <script>\n        function switchLanguage(lang) {\n            \/\/ Ascunde ambele versiuni\n            document.getElementById(\"content-ro\").style.display = \"none\";\n            document.getElementById(\"content-en\").style.display = \"none\";\n\n            \/\/ Reseteaz\u0103 stilurile butoanelor\n            document.querySelectorAll(\".lang-btn\").forEach(function(btn) {\n                btn.style.background = \"#e5e7eb\";\n                btn.style.color = \"#374151\";\n                btn.classList.remove(\"lang-btn-active\");\n            });\n\n            \/\/ Afi\u0219eaz\u0103 versiunea selectat\u0103\n            if (lang === \"ro\") {\n                document.getElementById(\"content-ro\").style.display = \"block\";\n                document.getElementById(\"btn-lang-ro\").style.background = \"#3b82f6\";\n                document.getElementById(\"btn-lang-ro\").style.color = \"white\";\n                document.getElementById(\"btn-lang-ro\").classList.add(\"lang-btn-active\");\n            } else {\n                document.getElementById(\"content-en\").style.display = \"block\";\n                document.getElementById(\"btn-lang-en\").style.background = \"#3b82f6\";\n                document.getElementById(\"btn-lang-en\").style.color = \"white\";\n                document.getElementById(\"btn-lang-en\").classList.add(\"lang-btn-active\");\n            }\n\n            \/\/ Salveaz\u0103 preferin\u021ba \u00een localStorage\n            localStorage.setItem(\"gpss_preferred_language\", lang);\n        }\n\n        \/\/ Restaureaz\u0103 preferin\u021ba utilizatorului la \u00eenc\u0103rcare\n        document.addEventListener(\"DOMContentLoaded\", function() {\n            var preferredLang = localStorage.getItem(\"gpss_preferred_language\") || \"ro\";\n            switchLanguage(preferredLang);\n        });\n\n        \/\/ Hover effects pentru butoane\n        document.querySelectorAll(\".lang-btn\").forEach(function(btn) {\n            btn.addEventListener(\"mouseenter\", function() {\n                if (!this.classList.contains(\"lang-btn-active\")) {\n                    this.style.background = \"#bfdbfe\";\n                    this.style.color = \"#1e40af\";\n                }\n            });\n            btn.addEventListener(\"mouseleave\", function() {\n                if (!this.classList.contains(\"lang-btn-active\")) {\n                    this.style.background = \"#e5e7eb\";\n                    this.style.color = \"#374151\";\n                }\n            });\n        });\n        <\/script>\n\n        <style>\n        .lang-btn:hover {\n            transform: translateY(-2px);\n            box-shadow: 0 4px 12px rgba(59, 130, 246, 0.3);\n        }\n        .lang-btn-active {\n            box-shadow: 0 4px 12px rgba(59, 130, 246, 0.4);\n        }\n        <\/style>","protected":false},"excerpt":{"rendered":"<p>\ud83c\udf0d Limb\u0103 \/ Language: \ud83c\uddec\ud83c\udde7 English (Original) \ud83c\uddf7\ud83c\uddf4 Rom\u00e2n\u0103 Traducere automat\u0103 \/ Automatic translation CERT-EU security guidance: Security White Paper 2016-003 &#8211; Authentication Methods Wednesday, January 11, 2017 09:56:00 AM CET Lately, protecting data has become increasingly difficult task. Cyber-attacks have become one of the most serious threats to any organization. Companies and organizations are [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":[],"advisory_audience":[108,191],"advisory_topic":[116,168],"advisory_source":[181],"advisory_severity":[183],"advisory_region":[176],"news_source":[],"class_list":["post-990593","security_advisory","type-security_advisory","status-publish","hentry","advisory_audience-individuals","advisory_audience-technical","advisory_topic-authentication","advisory_topic-data-protection","advisory_source-cert-eu","advisory_severity-high","advisory_region-international"],"_links":{"self":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security_advisory\/990593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security_advisory"}],"about":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/types\/security_advisory"}],"version-history":[{"count":1,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security_advisory\/990593\/revisions"}],"predecessor-version":[{"id":990984,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security_advisory\/990593\/revisions\/990984"}],"wp:attachment":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/media?parent=990593"}],"wp:term":[{"taxonomy":"advisory_audience","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_audience?post=990593"},{"taxonomy":"advisory_topic","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_topic?post=990593"},{"taxonomy":"advisory_source","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_source?post=990593"},{"taxonomy":"advisory_severity","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_severity?post=990593"},{"taxonomy":"advisory_region","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_region?post=990593"},{"taxonomy":"news_source","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/news_source?post=990593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}