Back

verification

1. In information assurance, comparing an activity, a process, or a product with the corresponding requirements or specifications. Note: Examples of verification are comparing a specification with a security policy model or comparing object code with source code. [2382-pt.8] 2. [The] process of comparing two levels of an information system (IS) specification for proper correspondence (e.g., security policy model with top-level specification, top-level specification with source code, or source code with object code). [INFOSEC-99]3. The checking of conformance between two representations of a system or part of a system [CESG].4.The process of comparing two levels of system specification for proper correspondence (e.g., security policy model with top-level specification, TLS with source code, or source code with object code).This process may or may not be automated [TCSEC].