P312 Broadband Security Gateway

Integrity

internet

Proof that the data is the same as originally intended. Unauthorized software or people have not altered the original information.

(Lower case i) Any time you connect 2 or more networks together, you have an internet.

Internet

(Upper case I) The vast collection of inter-connected networks that all use the TCP/IP

 

protocols and that evolved from the ARPANET of the late 60’s and early 70’s. The

 

Internet now (July 1995) connects roughly 60,000 independent networks into a vast

 

global internet

Internet Worm

See Worm.

Intranet

A private network inside a company or organization that uses the same kinds of

 

software that you would find on the public Internet, but that is only for internal use.

Intruder

IP

Person or software interested in breaking computer security to access, modify, or damage data. Also see Cracker.

Internet Protocol he IP (currently IP version 4, or IPv4), is the underlying protocol for routing packets on the Internet and other TCP/IP-based networks.

IPCP (PPP)

IPX

IP Control Protocol allows changes to IP parameters such as the IP address.

Internetwork Packet eXchange The native NetWare internetworking protocol is IPX (Internetwork Packet Exchange). Like IP (Internet Protocol), IPX is an internetworking protocol that provides datagram services.

IRC

ISP

Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system to “chat” over the network. Today IRC is a very popular way to “talk” in real time with other people on the Internet. However, IRC is also one avenue hackers use to get information from you about your system and your company. Moreover, IRC sessions are prone to numerous attacks that while not dangerous can cause your system to crash.

Internet Service Providers provide connections into the Internet for home users and businesses. There are local, regional, national, and global ISPs. You can think of local ISPs as the gatekeepers into the Internet.

LAN

Local Area Network is a shared communication system to which many computers are

 

attached. A LAN, as its name implies, is limited to a local area. This has to do more

 

with the electrical characteristics of the medium than the fact that many early LANs

 

were designed for departments, although the latter accurately describes a LAN as

 

well. LANs have different topologies, the most common being the linear bus and the

 

star configuration.

Linux

A version of the UNIX operating system designed to run on IBM Compatible

 

computers.

Logic Bomb

MAC

A virus that only activates itself when certain conditions are met. Logic bombs usually damage files or cause other serious problems when they are activated.

On a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) The MAC layer frames data for transmission over the network, then passes the frame to the physical layer interface where it is transmitted

V

Glossary

Page 243
Image 243
ZyXEL Communications P-312 manual Ipcp PPP IPX, Irc Isp, Mac