ZyWALL 10 Internet Security Gateway
R
Glossary
Integrity
Proof that the data is the same as originally intended. Unauthorized software or people
have not altered the original information.
internet
(Lower case i) Any time you connect 2 or more networks together, you have an internet.
Internet
(Upper case I) The vast collection of inter-connected networks that all use the TCP/IP
protocols and that evolved from the ARPANET of the late 60’s and early 70’s. The
Internet now (July 1995) connects roughly 60,000 independent networks into a vast
global internet
Internet Worm
See Worm.
Intranet
A private network inside a company or organization that uses the same kinds of
software that you would find on the public Internet, but that is only for internal use.
Intruder
Person or software interested in breaking computer security to access, modify, or
damage data. Also see Cracker.
IP
Internet Protocol he IP (currently IP version 4, or IPv4), is the underlying protocol for
routing packets on the Internet and other TCP/IP-based networks.
IPCP (PPP)
IP Control Protocol allows changes to IP parameters such as the IP address.
IPX
Internetwork Packet eXchange The native NetWare internetworking protocol is IPX
(Internetwork Packet Exchange). Like IP (Internet Protocol), IPX is an internetworking
protocol that provides datagram services.
IRC
Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on
a system to “chat” over the network. Today IRC is a very popular way to “talk” in real
time with other people on the Internet. However, IRC is also one avenue hackers use to
get information from you about your system and your company. Moreover, IRC sessions
are prone to numerous attacks that while not dangerous can cause your system to
crash.
ISP
Internet Service Providers provide connections into the Internet for home users and
businesses. There are local, regional, national, and global ISPs. You can think of local
ISPs as the gatekeepers into the Internet.
LAN
Local Area Network is a shared communication system to which many computers are
attached. A LAN, as its name implies, is limited to a local area. This has to do more with
the electrical characteristics of the medium than the fact that many early LANs were
designed for departments, although the latter accurately describes a LAN as well. LANs
have different topologies, the most common being the linear bus and the star
configuration.
Linux
A version of the UNIX operating system designed to run on IBM Compatible computers.
Logic Bomb
A virus that only activates itself when certain conditions are met. Logic bombs usually
damage files or cause other serious problems when they are activated.
MAC
On a local area network (LAN) or other network, the MAC (Media Access Control)
address is your computer's unique hardware number. (On an Ethernet LAN, it's the
Содержание ZyWALL 10
Страница 1: ...ZyWALL 10 Internet Security Gateway User s Guide Version 3 20 November 2000...
Страница 6: ...ZyWALL 10 Internet Security Gateway vi CE Doc...
Страница 22: ......
Страница 26: ......
Страница 30: ......
Страница 73: ......
Страница 96: ......
Страница 138: ......
Страница 161: ......
Страница 169: ......
Страница 181: ......
Страница 195: ......
Страница 203: ......
Страница 222: ......
Страница 226: ......