Prestige 964 Cable Router
10BaseT
ARP
Authenticity
Glossary of Terms
The
Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.
Proof that the information came from the person or location that reportedly sent it. One example of authenticating software is through digital signatures.
Back Door |
| A deliberately planned security breach in a program. Back doors allow special access to a |
|
| computer or program. Sometimes back doors can be exploited and allow a cracker unauthorized |
|
| access to data. |
|
|
|
Backbone |
| A |
|
|
|
BackOrifice |
| BackOrifice is a remote administration tool which allows a user to control a |
|
| computer across a TCP/IP connection using a simple console or GUI application. BackOrifice is |
|
| a potentially disastrous Trojan horse since it can provide the user unlimited access to a system. |
|
|
|
|
|
|
Bandwidth |
| This is the capacity on a link usually measured in |
|
|
|
Bit |
| (Binary Digit) |
|
| smallest unit of computerized data. |
Brute Force Hacking
Byte
Cable Modem (CM)
A technique used to find passwords or encryption keys. Force Hacking involves trying every possible combination of letters, numbers, etc. until the code is broken.
A set of bits that represent a single character. There are 8 bits in a Byte.
A cable modem is a device that enables you to hook up your computer to a local cable TV line and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56 Kbps telephone modems, and up to 128 Kbps of ISDN that is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone service. A cable modem can be added to or integrated with a set top box that turns your TV set into an Internet channel. For computer attachment, the cable line must be split so that part of the line goes to the TV set and the other part goes to the cable modem and the computer.
A cable modem is more like a network interface card (NIC) than a computer modem. All of the cable modems attached to a cable TV company coaxial cable line communicate with a Cable Modem Termination System (CMTS) at the local cable TV company office. All cable modems can receive only from and send signals to the CMTS, but not to other cable modems on the line.
| Camping Out |
|
| Staying in a "safe" place once a hacker has broken into a system. The term | |
|
|
|
| can be used with a physical location, electronic reference, or an entry point for future attacks. | |
|
|
|
|
|
|
|
|
|
|
|
|
| CATV |
|
| Cable TV system. Can be all coaxial- or HFC- (Hybrid Fiber Coax) based. | |
|
|
|
|
|
|
|
|
|
|
|
|
| CDR |
|
| Call Detail Record. This is a name used by telephone companies for call related information. |
|
|
|
|
|
|
|
| Channel |
|
| A specific frequency and bandwidth combination. In the present context, it means TV channels |
|
|
|
| for television services and downstream data for cable modems. |
| |
|
|
|
|
| |
|
|
|
|
| |
| CHAP |
|
| Challenge Handshake Authentication Protocol is an alternative protocol that avoids sending | |
|
|
|
| passwords over the wire by using a challenge/response technique. |
Glossary | E |