P312 Broadband Security Gateway

Name Resolution

NAT

as a stream of bits.

The allocation of an IP address to a host name. See DNS

Network Address Translation is the translation of an Internet Protocol address used within one network to a different IP address known within another network - see also SUA.

NDIS

Network Driver Interface Specification is a Windows specification for how

 

communication protocol programs (such as TCP/IP) and network device drivers should

 

communicate with each other.

NetBIOS

Network

Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a PC to connect to and communicate with a LAN.

Any time you connect 2 or more computers together so that they can share resources, you have a computer network. Connect 2 or more networks together and you have an internet.

NIC

Network Interface Card. A board that provides network communication capabilities to

 

and from a computer system. Also called an adapter.

Node

Packet Filter

PAP

Any single computer connected to a network

A filter that scans packets and decides whether to let them through.

Password Authentication Protocol PAP is a security protocol that requires users to enter a password before accessing a secure system. The user’s name and password are sent over the wire to a server, where they are compared with a database of user account names and passwords. This technique is vulnerable to wiretapping (eavesdropping) because the password can be captured and used by someone to log onto the system.

Password Cracker

A program that uses a dictionary of words, phrases, names, etc. to guess a password.

Password

A system of encrypting electronic files using a single key or password. Anyone who

encryption

knows the password can decrypt the file.

Password

The encrypted password is no visible in the passwd file but stored in a shadow file that

Shadowing

is only readable by root. This prevents brute force attacks on the encrypted field to

 

guess the password.

Penetration

Gaining access to computers or networks by bypassing security programs and

 

passwords.

Phreaking

Breaking into phone or other communication systems. Phreaking sites on the Internet

 

are popular among crackers and other criminals

Ping Attack

An attack that slows down the network until it is unusable. The attacker sends a "ping"

 

command to the network repeatedly to slow it down. See also Denial of Service.

Pirate

Someone who steals or distributes software without paying the legitimate owner for it.

 

This category of computer criminal includes several different types of illegal activities

 

Making copies of software for others to use. Distributing pirated software over the

 

Internet or a Bulletin Board System. Receiving or downloading illegal copies of

 

software in any form.

Pirated Software

Software that has been illegally copied, or that is being used in violation of the

 

software's licensing agreement. Pirated software is often distributed through pirate

 

bulletin boards or on the Internet. In the internet underground it is known as Warez.

Glossary

W

Page 244
Image 244
ZyXEL Communications P-312 manual Nat, Ndis, Nic, Pap