P312 Broadband Security Gateway
VGlossary
Integrity Proof that the data is the same as originally intended. Unauthorized software or people
have not altered the original information.
internet (Lower case i) Any time you connect 2 or more networks together, you have an
internet.
Internet (Upper case I) The vast collection of inter-connected networks that all use the TCP/IP
protocols and that evolved from the ARPANET of the late 60’s and early 70’s. The
Internet now (July 1995) connects roughly 60,000 independent networks into a vast
global internet
Internet Worm See Worm.
Intranet A private network inside a company or organization that uses the same kinds of
software that you would find on the public Internet, but that is only for internal use.
Intruder Person or software interested in breaking computer security to access, modify, or
damage data. Also see Cracker.
IP Internet Protocol he IP (currently IP version 4, or IPv4), is the underlying protocol for
routing packets on the Internet and other TCP/IP-based networks.
IPCP (PPP) IP Control Protocol allows changes to IP parameters such as the IP address.
IPX Internetwork Packet eXchange The native NetWare internetworking protocol is IPX
(Internetwork Packet Exchange). Like IP (Internet Protocol), IPX is an internetworking
protocol that provides datagram services.
IRC Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users
on a system to “chat” over the network. Today IRC is a very popular way to “talk” in
real time with other people on the Internet. However, IRC is also one avenue hackers
use to get information from you about your system and your company. Moreover, IRC
sessions are prone to numerous attacks that while not dangerous can cause your
system to crash.
ISP Internet Service Providers provide connections into the Internet for home users and
businesses. There are local, regional, national, and global ISPs. You can think of local
ISPs as the gatekeepers into the Internet.
LAN Local Area Network is a shared communication system to which many computers are
attached. A LAN, as its name implies, is limited to a local area. This has to do more
with the electrical characteristics of the medium than the fact that many early LANs
were designed for departments, although the latter accurately describes a LAN as
well. LANs have different topologies, the most common being the linear bus and the
star configuration.
Linux A version of the UNIX operating system designed to run on IBM Compatible
computers.
Logic Bomb A virus that only activates itself when certain conditions are met. Logic bombs usually
damage files or cause other serious problems when they are activated.
MAC On a local area network (LAN) or other network, the MAC (Media Access Control)
address is your computer's unique hardware number. (On an Ethernet LAN, it's the
same as your Ethernet address.) The MAC layer frames data for transmission over the
network, then passes the frame to the physical layer interface where it is transmitted