Internet Security: A Jumpstart for Systems Administrators and IT Managers
|
- Encryption
-
A process of disguising information so that it cannot be read or interpreted by an unauthorized person.
- Ethernet
-
A network that is specified in a standard IEEE 802.3. Xerox, DEC, and Intel originally developed Ethernet.
- Ethical Hackers
-
Legal hackers who will hack into your system after obtaining legal and company permission. These hacking companies are paid to perform this operation and will provide a report on the findings after hacking into your systems.
- Firewall
-
Hardware and/or software that will protect the trusted resources of a private network and help prevent attacks from untrusted networks.
- Foot Printing
-
The process of obtaining data about a particular individual or company. This information can be obtained from various resources, including public resources (also known as profiling).
- FTP(File Transfer Protocol)
-
Uses TCP/IP ports 21 and 22.
- Hacker
-
A person that wants to get into your computer systems without authority.
- HTTP(Hypertext Transfer Protocol)
-
The protocol used via the World Wide Web.
- HTTPS(Secure Hypertext Transfer Protocol)
-
A protocol developed by Netscape that will encrypt the data at the "network" layer
See also SSL(Secure Sockets Layer).
- IETF
-
Internet Engineering Task Force.
- IMAP(Internet Message Access Protocol)
-
A standard for accessing electronic mail from a server. Typically used on port 143 or, "IMAP for SSL IS ON 993."
- IP(Internet Protocol)
-
A method data sent from one computer to another on any network (public or private).
- IPSec(Internet Protocol Security)
-
An in-development standard for security at the network layer of network communication. This protocol can be used with VPN (Virtual Private Network).
- ISO
-
International Organization of Standards.
- ISP(Internet Service Provider)
-
A company that provides individuals and/or companies with access to the Internet and other related services.
- Key
-
A series of numbers that is used by an encryption algorithm to transform plaintext data into encrypted data.
- Key Generation
-
The process for creating keys in a browser (see <keygen> tag at http://users.knoware.nl/users/schluter/doc/tags/TAG_KEYGEN.html).
- Key Management
-
Systemic processes associated with the secure generation, transport, storage, and destruction of encryption keys.
- Key Recovery
-
A PKI key management process associated with the retrieval of a key lost by the key holder.
- Key Ring File
-
A file that can house the certificate.
- Key Serial Number
-
A 128-bit number associated with a certificate.
|