Appendix A: Glossary

TLS Transport Layer Security. The successor to SSL. It prevents eavesdropping on communications between Internet client and server. For more information, see RFC 2240 at http://www.ietf.org/rfc/rfc2246.txt.

transient agent An agent that is installed on the endpoint for a short time only at the beginning of each test. The ActiveX test method uses a transient agent.

Trojan A malicious program disguised as or embedded within legitimate software. The term comes from the classical myth of the Trojan horse—something that looks useful, interesting, or harmless, but is actually harmful when executed. Trojans cannot operate autonomously, in contrast to some other types of malware such as viruses or worms. Trojans “hitch a ride” on an executable program that the intended victim must deliberately launch.

There are two common types of Trojan. One is found in otherwise useful software that has been corrupted by the insertion of the Trojan, which executes while the program is used, for example, in weather-alerting pro- grams, computer clock-setting software, and peer-to-peer file-sharing utilities. The other type of Trojan is a standalone program that masquerades as some- thing else, such as program that claims to rid your hard drive of viruses but in fact inserts them.

TTLS Tunneled TLS. An extension to TLS that does not require the client to be authenticated by a CA-signedPKI certificate. For more information, see the Internet Draft at http://tools.ietf.org/wg/eap/draft-funk-eap-ttls-v0-01.txt.

U

UDP User Datagram Protocol. A stateless protocol that is part of the IP protocol suite. Using UDP, programs on network computers can send datagrams to one another. UDP does not provide the reliability and ordering guarantees that TCP does; datagrams may arrive out of order or go missing without notice. However, UDP is faster and more efficient for many lightweight or time- sensitive programs. For more information, see RFC 768 at http://www.ietf.org/ rfc/rfc0768.txt.

UMTS Universal Mobile Telecommunications System. A third-generation cellular technology successor to GSM. Also called 3GSM. For more information, see the specification at http://www.3gpp.org/ftp/Specs/html-info/21101.htm.

unmanaged A device that is not under the company’s administrative control. Examples endpoint include a guest’s computer or a contractor’s computer. Such a device is still

subject to the company’s network security policies.

A-22

Page 292
Image 292
HP Access Control Client Software manual Appendix a Glossary