L-P


L2F(Layer Two Forwarding)

Protocol used in VPNs.

L2TP(Layer Two Tunneling Protocol)

Protocol used in VPNs.

LDAP(Lightweight Directory Access Protocol)

The Internet standard for simple directories used for messaging and similar applications.

LDIF(LDAP Data Interchange Format)

A file format used to import or export data from a Lightweight Directory Access Protocol directory. These files are ASCII text files. In many cases, the files can be exported from one source and imported into another type of software. For example: Export data from an LDAP directory and import it into a private data source to register users.

LRA(Local Registration Authority)

Evaluates and approves or rejects certificate applications on behalf of a CA.

MD2(Message Digest Two)

An algorithm that takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

MD5(Message Digest Five)

An algorithm that takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

MIME(Multipurpose Internet Mail Extensions)

A method to exchange different kinds of data files on a network: video, audio, images, and others. MIME is transported via the SMTP protocol.

NNTP(Network News Transfer Protocol)

A protocol used by computers for managing the notes posted on UseNet newsgroups.

Nonrepudiation

Cryptographic assurance that a message sender cannot later deny sending a message, or that the recipient cannot deny receipt.

Nontrusted Network

A network that is defined by a company as not being trusted; in many cases, this can even be the Internet.

OSI(Open Systems Interconnection)

Also known as the OSI reference model. This describes a standard for how messages should be transmitted between any two points in a network. The reference model defines seven layers that take place at each end of a communication (

See also Application.

PGP(Pretty Good Privacy)

See http://www.pgp.com/ for information and product descriptions.

Physical

The first layer of the OSI reference model. This layer connects the bit stream through the network at the electrical and mechanical level.

Physical Access

Can define access to a particular computer or site. Physical access should be controlled in a secure environment.

PIN

Personal Identification Number.

Ping

A program that lets you verify that a particular IP address exists and can accept requests. Ping is typically used as a diagnostic.

Ping of Death

A technique that hackers use to overwhelm a computer with ping requests.

PKCS(Public-Key Cryptography System)

A set of standard protocols developed by RSA for secure information exchange.

PKI

Public Key Infrastructure.

PKIX

A set of standards for PKI from the IETF.

POP(Point-of-Presence)

A location where a network can be accessed.

POP3(Post Office Protocol Three)

A standard protocol for receiving e-mail. POP3 typically uses TCP/IP port 110.

Port

A mechanism for TCP to communicate with an application.

PPP(Point-to-Point Protocol)

A protocol for communication between two computers.

PPTP(Point-to-Point Tunneling Protocol)

A protocol that allows corporations to extend their own corporate network through encrypted "tunnels" over a nontrusted network (a good example would be via the Internet).

Presentation

Another layer of the OSI reference model. This layer can be part of an operating system that converts incoming and outgoing data from one presentation format to another.

Private Key

A cryptographic key known only to the user, and implemented in public key cryptography in decrypting or signing information.

Protocol

The special set of rules for communications that computers use when sending signals between themselves.

Public Key

A cryptographic key implemented in public key cryptography to encrypt data to the key's owner, or to verify the key owner's signature. The public key can be published, for example, in LDAP, without revealing the owner's corresponding private key.

Public-Private Key Pair

A form of asymmetric encryption in which all parties possess a pair of keys, one private and one public, for use in encryption and/or digital signing of data.




Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net