E-K


Encryption

A process of disguising information so that it cannot be read or interpreted by an unauthorized person.

Ethernet

A network that is specified in a standard IEEE 802.3. Xerox, DEC, and Intel originally developed Ethernet.

Ethical Hackers

Legal hackers who will hack into your system after obtaining legal and company permission. These hacking companies are paid to perform this operation and will provide a report on the findings after hacking into your systems.

Firewall

Hardware and/or software that will protect the trusted resources of a private network and help prevent attacks from untrusted networks.

Foot Printing

The process of obtaining data about a particular individual or company. This information can be obtained from various resources, including public resources (also known as profiling).

FTP(File Transfer Protocol)

Uses TCP/IP ports 21 and 22.

Hacker

A person that wants to get into your computer systems without authority.

HTTP(Hypertext Transfer Protocol)

The protocol used via the World Wide Web.

HTTPS(Secure Hypertext Transfer Protocol)

A protocol developed by Netscape that will encrypt the data at the "network" layer

See also SSL(Secure Sockets Layer).

IETF

Internet Engineering Task Force.

IMAP(Internet Message Access Protocol)

A standard for accessing electronic mail from a server. Typically used on port 143 or, "IMAP for SSL IS ON 993."

IP(Internet Protocol)

A method data sent from one computer to another on any network (public or private).

IPSec(Internet Protocol Security)

An in-development standard for security at the network layer of network communication. This protocol can be used with VPN (Virtual Private Network).

ISO

International Organization of Standards.

ISP(Internet Service Provider)

A company that provides individuals and/or companies with access to the Internet and other related services.

Key

A series of numbers that is used by an encryption algorithm to transform plaintext data into encrypted data.

Key Generation

The process for creating keys in a browser (see <keygen> tag at http://users.knoware.nl/users/schluter/doc/tags/TAG_KEYGEN.html).

Key Management

Systemic processes associated with the secure generation, transport, storage, and destruction of encryption keys.

Key Recovery

A PKI key management process associated with the retrieval of a key lost by the key holder.

Key Ring File

A file that can house the certificate.

Key Serial Number

A 128-bit number associated with a certificate.




Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net