Glossary of Terms
484
Nokia IP60 Security Appliance User Guide
direct access form this server back to the private
network.
F
Firmware
Software embedded in a device.
G
Gateway
A network point that acts as an entrance to
another network.
H
Hacking
An activity in which someone breaks into
someone else's computer system, bypasses
passwords or licenses in computer programs; or
in other ways intentionally breaches computer
security. The end result is that whatever resides
on the computer can be viewed and sensitive
data can be stolen without anyone knowing
about it. Sometimes, tiny programs are 'planted'
on the computer that are designed to watch out
for, seize and then transmit to another computer,
specific types of data.
HTTPS
Hypertext Transfer Protocol over Secure Socket
Layer, or HTTP over SSL.
A protocol for accessing a secure Web server. It
uses SSL as a sublayer under the regular HTTP
application. This directs messages to a secure
port number rather than the default Web port
number, and uses a public key to encrypt data
HTTPS is used to transfer confidential user
information.
Hub
A device with multiple ports, connecting several
PCs or network devices on a network.
I
IP Address
An IP address is a 32-bit number that identifies
each computer sending or receiving data packets
across the Internet. When you request an HTML
page or send e-mail, the Internet Protocol part of
TCP/IP includes your IP address in the message
and sends it to the IP address that is obtained by
looking up the domain name in the Uniform
Resource Locator you requested or in the e-mail
address you're sending a note to. At the other
end, the recipient can see the IP address of the
Web page requestor or the e-mail sender and can
respond by sending another message using the
IP address it received.
IP Spoofing
A technique where an attacker attempts to gain
unauthorized access through a false source
address to make it appear as though
communications have originated in a part of the
network with higher access privileges. For
example, a packet originating on the Internet
may be masquerading as a local packet with the
source IP address of an internal host. The
firewall can protect against IP spoofing attacks
by limiting network access based on the gateway
interface from which data is being received.
IPSEC
IPSEC is the leading Virtual Private Networking
(VPN) standard. IPSEC enables individuals or
offices to establish secure communication
channels ('tunnels') over the Internet.
ISP
An ISP (Internet service provider) is a company
that provides access to the Internet and other
related services.
L
LAN
A local area network (LAN) is a group of
computers and associated devices that share a
common communications line and typically
share the resources of a single server within a
small geographic area.
M
MAC Address
The MAC (Media Access Control) address is a
computer's unique hardware number. When
connected to the Internet from your computer, a
mapping relates your IP address to your
computer's physical (MAC) address on the
LAN.
Содержание IP60 - Security Appliance
Страница 1: ...Part No N450000643 Rev 001 Published February 2008 Nokia IP60 Security Appliance User Guide ...
Страница 4: ...4 Nokia IP60 Security Appliance User Guide ...
Страница 10: ......
Страница 12: ......
Страница 38: ......
Страница 58: ......
Страница 108: ......
Страница 268: ......
Страница 482: ......