|
Protocol used in VPNs.
Protocol used in VPNs.
The Internet standard for simple directories used for messaging and similar applications.
A file format used to import or export data from a Lightweight Directory Access Protocol directory. These files are ASCII text files. In many cases, the files can be exported from one source and imported into another type of software. For example: Export data from an LDAP directory and import it into a private data source to register users.
Evaluates and approves or rejects certificate applications on behalf of a CA.
An algorithm that takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
An algorithm that takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
A method to exchange different kinds of data files on a network: video, audio, images, and others. MIME is transported via the SMTP protocol.
A protocol used by computers for managing the notes posted on UseNet newsgroups.
Cryptographic assurance that a message sender cannot later deny sending a message, or that the recipient cannot deny receipt.
A network that is defined by a company as not being trusted; in many cases, this can even be the Internet.
Also known as the OSI reference model. This describes a standard for how messages should be transmitted between any two points in a network. The reference model defines seven layers that take place at each end of a communication (
See also Application.
See http://www.pgp.com/ for information and product descriptions.
The first layer of the OSI reference model. This layer connects the bit stream through the network at the electrical and mechanical level.
Can define access to a particular computer or site. Physical access should be controlled in a secure environment.
Personal Identification Number.
A program that lets you verify that a particular IP address exists and can accept requests. Ping is typically used as a diagnostic.
A technique that hackers use to overwhelm a computer with ping requests.
A set of standard protocols developed by RSA for secure information exchange.
Public Key Infrastructure.
A set of standards for PKI from the IETF.
A location where a network can be accessed.
A standard protocol for receiving e-mail. POP3 typically uses TCP/IP port 110.
A mechanism for TCP to communicate with an application.
A protocol for communication between two computers.
A protocol that allows corporations to extend their own corporate network through encrypted "tunnels" over a nontrusted network (a good example would be via the Internet).
Another layer of the OSI reference model. This layer can be part of an operating system that converts incoming and outgoing data from one presentation format to another.
A cryptographic key known only to the user, and implemented in public key cryptography in decrypting or signing information.
The special set of rules for communications that computers use when sending signals between themselves.
A cryptographic key implemented in public key cryptography to encrypt data to the key's owner, or to verify the key owner's signature. The public key can be published, for example, in LDAP, without revealing the owner's corresponding private key.
A form of asymmetric encryption in which all parties possess a pair of keys, one private and one public, for use in encryption and/or digital signing of data.
|