678
G
LOSSARY
cryptography
The science of information security. Modern cryptography is typically
concerned with the processes of scrambling ordinary text (known as
plain text
or
clear text
) into encrypted text at the sender’s end of a
connection, and decrypting the encrypted text back into clear text at
the receiver’s end. Because its security is independent of the channels
through which the text passes, cryptography is the only way of
protecting communications over channels that are not under the user’s
control. The goals of cryptography are
confidentiality
,
integrity
,
nonrepudiation
, and
authentication
. The encrypted information cannot
be understood by anyone for whom it is not intended, or altered in
storage or transmission without the alteration being detected. The
sender cannot later deny the creation or transmission of the
information, and the sender and receiver can confirm each other’s
identity and the information’s origin and destination.
CSR
Certificate Signing Request. A message sent by an administrator to
request a security certificate from a certificate authority (CA). A CSR is
a text string formatted by Privacy-Enhanced Mail (PEM) protocol
according to Public Key Cryptography Standard (PKCS) #10. The CSR
contains the information needed by the certificate authority to generate
the certificate.
CSV file
Comma-separated values file. A text file that displays tabular data in a
comma-delimited format, as a list of rows in which each column’s value
is separated from the next by a comma. A CSV file is useful for
transferring data between database applications.
cyclic redundancy
check
See
CRC
.
dBm
Decibels referred to 1 milliwatt (mW). A measurement of relative power
related to 1 mW. For example,
20 dBm
corresponds to
10
20 dBm/10
=
100 mW
.
decibels referred to
1 milliwatt (mW).
See
dBm
.
Data Encryption
Standard
See
DES
.
delivery traffic
indication map
See
DTIM
.
Содержание 3CRWX120695A
Страница 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Страница 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Страница 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Страница 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Страница 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Страница 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Страница 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Страница 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Страница 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Страница 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Страница 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Страница 706: ...706 GLOSSARY ...