Glossary
Contents
Central Management System
Page 47 of 51
Page 47 of 51
Central Management System
To sign up to one of these services, follow the instructions and documentation on the provider's website.
You'll receive a username and password from your Dynamic DNS provider. Enter these in the appropriate
section on the SecureME Networks Dynamic DNS screen. Once entered, each time your CPE changes its
public IP address, it will update your Dynamic DNS provider.
A software application for the construction and transmission of SMTP messages. Examples are
MS Outlook, Thunderbird and Apple Mail.
Ethernet
Ethernet is the most widely installed local area network (LAN) technology. Specified in
a standard, IEEE 802.3, Ethernet was originally developed by Xerox and then developed
further by Xerox, DEC, and Intel. An Ethernet LAN typically uses special grades of twisted
pair wires such as CAT5 or CAT5e.
Firewall System
A firewall prevents unwanted Internet services from coming into or leaving the office network.
It's a technological barrier designed to prevent unapproved or unwanted, possibly destructive,
communications between computer networks or servers and hosts. A firewall filters the information
coming through the Internet connection into your private network or between computer systems in an
internal network. If an incoming packet of information is flagged by the filters, it is not allowed through.
In short, it provides a strong, first line of defence from the following types of attacks:
n
Remote login
remotely control your computer and access sensitive files.
n
Application backdoors
a hacker capitalises on the flaws with remote access in some applications.
n
SMTP session hijacking
gaining access to your email contacts and using these for the purposes of spam.
n
Operating system bugs
similar to application backdoors, but through the operating system in this case.
n
(Distributed) Denial of Service (DDoS)
essentially crippling your office system or server by sending a multitude of bogus requests for non-
existent connections.
n
E-mail bombs
Thousands of emails are sent to your inbox, incapacitating your email system.
n
Macros
A macro is usually used to simplify tasks by bundling a series of commands into one action. However
hackers have exploited these, using them to perform a series of malicious commands on your computer.
n
Viruses
A well-known threat that is self-replicating and can spread throughout your network causing minor to
major damage.
n
Spam
More of a hindrance than a threat, however some can contain links to malicious websites.
n
Redirect bombs
Hackers can redirect the path information takes by sending it to a different router. A method used for
denial of service attacks.
n
Source routing
Generally information (packets) moves through the Internet and local networks with the aid of routers.
However the specific route is randomly determined by the source. Hackers mimic this behaviour to make