|
|
See Layer 2 Forwarding.
See Layer 2 Tunneling Protocol.
See Local Area Network.
The amount of wait time.
The concept that access differs at different levels. This is often used in discussion with Biba and Bell and LaPadula models, as well as with cryptography.
A tunneling protocol often used with Virtual Private Networks (VPNs). L2F was developed by Cisco.
A tunneling protocol that adds functionality to PPP. This protocol was created by Microsoft and Cisco and often used with Virtual Private Networks (VPNs).
See Link Control Protocol.
A set of protocols derived from X.500 that operates at Port 389.
Slang for the dump utility that offers several types of backups. A Level 0 backup is a full backup, and any number above that (up to 9) includes only some files.
See LDAP.
Information that is not intended for release to the public. This category of information is not secret, but it is private.
The protocol used to establish, configure, and test the link between a client and PPP host. See also Point-to-Point Protocol.
A network that is restricted to a single building, group of buildings, or even a single room. A LAN can have one or more servers.
An authority used to identify or establish the identity of an individual for certificate issuance
Any code hidden within an application that causes something unexpected to happen based upon some criteria being met. For example, a programmer could create a program that always makes sure his name appears on the payroll roster; if it does not, then key files start being erased.
Tools used to help an organization know what is happening to organizational systems and assets. System logs tell what is happening with the systems in the network. Inventories refer to both the physical assets and the software assets your company owns.
|
|