
44
9
9
Overview 9
In today’s world there are many security threats to your network and the data that travels over it. Your Brother
machine employs some of the latest network security and encryption protocols available today. These
network features can be integrated into your overall network security plan to help protect your data and
prevent unauthorized access to the ma chine. This chapter explains the various securit y protocols supported
and how to configure them.
Security terms 9
CA (Certificate Authority)
A CA is an entity that issues digital cer tificates (especially X.509 certificates ) and vouches for the binding
between the data items in a certificate.
CSR (Certificate Signing Request)
A CSR is a message sent from an applic ant to a CA in order to apply for issue of a certificate. T he CSR
contains information identifying the applicant, the public key generated by the app licant and the digital
signature of the applicant.
Certificate
A Certificate is the informa tion that binds together a publ ic key with an identity. The certificate can be used
to verify that a public key belongs to an individual. The format is defined by the x.509 standard.
Digital signature
A Digital signature is a value comput ed with a cryptographic algorithm and appen ded to a data object in
such a way that any recipient of the data can use the signature to verify the data's origin and integrity.
Public key cryptosystem
A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of
keys (a public key and a private key) and use a different component of the pair for different steps of the
algorithm.
Shared key cryptosystem
A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two
different steps of the algorithm (such as encryption and decryption).
Security features 9