P312 Broadband Security Gateway

Public Key

Encryption

PVC

system, meaning that an end-to-end private circuit is established between caller and callee.

System of encrypting electronic files using a key pair. The key pair contains a public key used during encryption, and a corresponding private key used during decryption.

Permanent Virtual Circuit. A PVC is a logical point-to-point circuit between customer sites. PVCs are low-delay circuits because routing decisions do not need to be made along the way. Permanent means that the circuit is preprogrammed by the carrier as a path through the network. It does not need to be set up or torn down for each session.

Reconnaissance

RFC

The finding and observation of potential targets for a cracker to attack.

An RFC (Request for Comments) is an Internet formal document or standard that is the result of committee drafting and subsequent review by interested parties. Some RFCs are informational in nature. Of those that are intended to become Internet standards, the final version of the RFC becomes the standard and no further comments or changes are permitted. Change can occur, however, through subsequent RFCs.

RIP

Routing Information Protocol is an interior or intra-domain routing protocol that uses

 

the distance-vector routing algorithms. RIP is used on the Internet and is common in

 

the NetWare environment as a method for exchanging routing information between

 

routers.

Router

SAP

A device that connects two networks together. Routers monitor, direct, and filter information that passes between these networks. Because of their location, routers are a good place to install traffic or mail filters. Routers are also prone to attacks because they contain a great deal of information about a network.

In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available services on the network that other network devices can listen to. A server sends out SAP messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network.

SATAN

Server

A UNIX program that gathers information on networks and stores it in databases. It is helpful in finding security flaws such as incorrect settings, software bugs and poor policy decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find security flaws in their network systems.

A computer, or a software package, that provides a specific kind of service to client software running on other computers.

Shoulder Surfing

SNMP

Looking over someone's shoulder to see the numbers they dial on a phone, or the information they enter into a computer.

System Network Management Protocol is a popular management protocol defined by the Internet community for TCP/IP networks. It is a communication protocol for collecting information from devices on the network.

Snooping

Passively watching a network for information that could be used to a hacker's

 

advantage, such as passwords. Usually done while Camping Out.

SOCKS

A protocol that handles TCP traffic through proxy servers.

Glossary

Y

Page 246
Image 246
ZyXEL Communications P-312 manual Pvc, Rfc, Rip, Sap, Satan, Snmp, Socks