Appendix A: Glossary

RC4 Rivest Cipher 4. A widely used stream cipher that is used by SSL and WEP. Also called “arcfour.” RC4 is not recommended for use by new systems because it is not very strong cryptographically. For more information, see the Internet Draft at http://www.mozilla.org/projects/security/pki/nss/draft-

kaukonen-cipher-arcfour-03.txt.

remediation The process by which a non-compliant endpoint is made compliant. For example, if a Windows service pack is missing on an endpoint, the end-user must install the service pack before being allowed network access. In this case, an end-user screen gives the end-user instructions for running Windows Update.

remote mirroring Technology that enables you to send mirrored traffic from network devices to a remote analyzer using the network infrastructure rather than a dedicated line.

remote procedure See RPC. call

rootkit Several programs that are secretly installed on a network device after it has been successfully attacked. These programs give an attacker administrator- level access so that they can open network back doors and steal personal or network information. Rootkits are extremely difficult to detect and even more difficult to remove.

RP Radio Port. A “thin” AP that has an antenna and transceiver but that does not store an ACL or other configuration information. RPs are controlled centrally from a module such as Wireless Edge Services Module.

RPC Remote Procedure Call. A procedure to permit arguments or parameters to be sent to a program on a remote system. The remote program executes and returns the results. RPC can be used as an alternative to an agent for testing.

RSA Rivest-Shamir-Adleman. A public-keyencryption technology developed by RSA Data Security, Inc. The RSA algorithm is based on the fact that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of computer processing power and time.

RSA supports keys between 1024 and 2048 bits long. RSA keys can be used for signing digital certificates. For more information, see the RSA Cryptogra- phy Standard at http://www.rsa.com/rsalabs/node.asp?id=2125.

RSTP Rapid Spanning Tree Protocol. An evolution of STP that provides for faster spanning-tree convergence after a topology change. RSTP prevents broadcast storms (unintentional DoS attacks) that arise from redundant network links in an OSI Layer 2 switched network. For more information, see IEEE 802.1D- 2004 at http://standards.ieee.org/getieee802/download/802.1D-2004.pdf.

A-19

Page 289
Image 289
HP Access Control Client Software manual Remote procedure See RPC. call