ZyWALL 10 Internet Security Gateway

10BaseT

ARP

Authenticity

Back Door

Backbone BackOrifice

Bandwidth

Bit

Brute Force Hacking

Byte Camping Out

CDR

CHAP

Cipher Text

Client

Glossary of Terms

The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair cabling (Category 3 or 5): one pair for transmitting data and the other for receiving data.

Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.

Proof that the information came from the person or location that reportedly sent it. One example of authenticating software is through digital signatures.

A deliberately planned security breach in a program. Back doors allow special access to a computer or program. Sometimes back doors can be exploited and allow a cracker unauthorized access to data.

A high-speed line or series of connections that forms a major pathway within a network.

BackOrifice is a remote administration tool which allows a user to control a computer across a TCP/IP connection using a simple console or GUI application. BackOrifice is a potentially disastrous Trojan horse since it can provide the user unlimited access to a system.

This is the capacity on a link usually measured in bits-per-second (bps).

(Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a zero. The smallest unit of computerized data.

A technique used to find passwords or encryption keys. Force Hacking involves trying every possible combination of letters, numbers, etc. until the code is broken.

A set of bits that represent a single character. There are 8 bits in a Byte.

Staying in a "safe" place once a hacker has broken into a system. The term

can be used with a physical location, electronic reference, or an entry point for future attacks.

Call Detail Record. This is a name used by telephone companies for call related information.

Challenge Handshake Authentication Protocol is an alternative protocol that avoids sending passwords over the wire by using a challenge/response technique.

Text that has been scrambled or encrypted so that it cannot be read without deciphering it. See Encryption

A software program that is used to contact and obtain data from a Server software program on another computer. Each Client program is designed to work with one or more specific kinds of Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific kind of Client.

N

Glossary of Terms