ZyWALL 10 Internet Security Gateway
Integrity
internet
Internet
Internet Worm Intranet
Intruder
IP
IPCP (PPP)
IPX
IRC
ISP
LAN
Linux
Logic Bomb
MAC
Proof that the data is the same as originally intended. Unauthorized software or people have not altered the original information.
(Lower case i) Any time you connect 2 or more networks together, you have an internet.
(Upper case I) The vast collection of
See Worm.
A private network inside a company or organization that uses the same kinds of software that you would find on the public Internet, but that is only for internal use.
Person or software interested in breaking computer security to access, modify, or damage data. Also see Cracker.
Internet Protocol he IP (currently IP version 4, or IPv4), is the underlying protocol for routing packets on the Internet and other
IP Control Protocol allows changes to IP parameters such as the IP address.
Internetwork Packet eXchange The native NetWare internetworking protocol is IPX (Internetwork Packet Exchange). Like IP (Internet Protocol), IPX is an internetworking protocol that provides datagram services.
Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system to “chat” over the network. Today IRC is a very popular way to “talk” in real time with other people on the Internet. However, IRC is also one avenue hackers use to get information from you about your system and your company. Moreover, IRC sessions are prone to numerous attacks that while not dangerous can cause your system to crash.
Internet Service Providers provide connections into the Internet for home users and businesses. There are local, regional, national, and global ISPs. You can think of local ISPs as the gatekeepers into the Internet.
Local Area Network is a shared communication system to which many computers are attached. A LAN, as its name implies, is limited to a local area. This has to do more with the electrical characteristics of the medium than the fact that many early LANs were designed for departments, although the latter accurately describes a LAN as well. LANs have different topologies, the most common being the linear bus and the star configuration.
A version of the UNIX operating system designed to run on IBM Compatible computers.
A virus that only activates itself when certain conditions are met. Logic bombs usually damage files or cause other serious problems when they are activated.
On a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the
R | Glossary of Terms |