
P312 Broadband Security Gateway
R
Glossary
Glossary of Terms
10BaseT
The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair
cabling (Category 3 or 5): one pair for transmitting data and the other for receiving
data.
ARP
Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP
address) to a physical machine address that is recognized in the local network.
Authenticity
Proof that the information came from the person or location that reportedly sent it.
One example of authenticating software is through digital signatures.
Back Door
A deliberately planned security breach in a program. Back doors allow special access
to a computer or program. Sometimes back doors can be exploited and allow a
cracker unauthorized access to data.
Backbone
A high-speed line or series of connections that forms a major pathway within a
network.
BackOrifice
BackOrifice is a remote administration tool which allows a user to control a
computer across a TCP/IP connection using a simple console or GUI application.
BackOrifice is a potentially disastrous Trojan horse since it can provide the user
unlimited access to a system.
Bandwidth
This is the capacity on a link usually measured in bits-per-second (bps).
Bit
(Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a zero.
The smallest unit of computerized data.
Brute Force
Hacking
A technique used to find passwords or encryption keys.
Force Hacking involves trying
every possible combination of letters, numbers, etc. until the code is broken.
Byte
A set of bits that represent a single character. There are 8 bits in a Byte.
Camping Out
Staying in a "safe" place once a hacker has broken into a system. The term
can be used with a physical location, electronic reference, or an entry point for future
attacks.
CDR
Call Detail Record. This is a name used by telephone companies for call related
information.
CHAP
Challenge Handshake Authentication Protocol is an alternative protocol that avoids
sending passwords over the wire by using a challenge/response technique.
Cipher Text
Text that has been scrambled or encrypted so that it cannot be read without
deciphering it. See Encryption
Client
A software program that is used to contact and obtain data from a Server software
program on another computer. Each Client program is designed to work with one or
more specific kinds of Server programs, and each Server requires a specific kind of
Client. A Web Browser is a specific kind of Client.
Summary of Contents for Broadband Security Gateway P-312
Page 1: ...Prestige 312 Broadband Security Gateway User s Guide Version 3 20 November 2000 ...
Page 6: ...P312 Broadband Security Gateway vi CE Doc ...
Page 22: ......
Page 26: ......
Page 30: ......
Page 73: ......
Page 95: ......
Page 137: ......
Page 160: ......
Page 168: ......
Page 180: ......
Page 193: ...P312 Broadband Security Gateway Creating Custom Rules 16 13 Figure 16 6 Timeout Screen ...
Page 202: ......
Page 221: ......
Page 225: ......
Page 249: ......