| Instruction Manual | |
|
| |
TERM | MEANING | |
|
| |
| A Certificate Authority is a trusted third party, | |
| which certifies public key's to truly belong to their | |
| claimed owners. It is a key part of any Public Key | |
Certificate Authority | Infrastructure, since it allows users to trust that a | |
| given public key is the one they wish to use, either | |
| to send a private message to its owner or to verify | |
| the signature on a message sent by that owner. | |
|
| |
| A list of certificates that have been revoked by the | |
| CA before they expired. This may be necessary if | |
Certificate | the private key certificate has been compromised | |
Revocation List | or if the holder of the certificate is to be denied | |
| the ability to establish a connection to the IMG/IM/ | |
| CM4000. | |
|
| |
| ChallengeHandshake Authentication Protocol | |
| (CHAP) is used to verify a user's name and | |
CHAP | password for PPP Internet connections. It is more | |
| secure than PAP, the other main authentication | |
| protocol. | |
|
| |
| Dynamic Host Configuration Protocol. A | |
DHCP | communications protocol that assigns IP | |
addresses to computers when they are connected | ||
| ||
| to the network. | |
|
| |
| Domain Name System that allocates Internet | |
DNS | domain names and translates them into IP | |
addresses. A domain name is a meaningful and | ||
| ||
| easy to remember name for an IP address. | |
|
| |
DUN | Dial Up Networking | |
|
| |
| The technique for converting a readable message | |
| (plaintext) into apparently random material | |
Encryption | (ciphertext) which cannot be read if intercepted. | |
| The proper decryption key is required to read the | |
| message. | |
|
| |
Ethernet | A physical layer protocol based upon IEEE | |
standards | ||
| ||
|
|
122