ZyWALL 10 Internet Security Gateway
Proxy Server
PSTN
Public Key
Encryption
PVC
Reconnaissance
RFC
RIP
A server that performs network operations in lieu of other systems on the network. Proxy Servers are most often used as part of a firewall to mask the identity of users inside a corporate network yet still provide access to the Internet. When a user connects to a proxy server, via a web browser or other networked application, he submits commands to the proxy server. The server then submits those same commands to the Internet, yet without revealing any information about the system that originally requested the information. Proxy servers are an ideal way to also have all users on a corporate network channel through one point for all external communications. Proxy servers can be configured to block certain kinds of connections and stop some hacks.
Public Switched Telephone Network was put into place many years ago as a voice telephone
System of encrypting electronic files using a key pair. The key pair contains a public key used during encryption, and a corresponding private key used during decryption.
Permanent Virtual Circuit. A PVC is a logical
The finding and observation of potential targets for a cracker to attack.
An RFC (Request for Comments) is an Internet formal document or standard that is the result of committee drafting and subsequent review by interested parties. Some RFCs are informational in nature. Of those that are intended to become Internet standards, the final version of the RFC becomes the standard and no further comments or changes are permitted. Change can occur, however, through subsequent RFCs.
Routing Information Protocol is an interior or
Router
SAP
A device that connects two networks together. Routers monitor, direct, and filter information that passes between these networks. Because of their location, routers are a good place to install traffic or mail filters. Routers are also prone to attacks because they contain a great deal of information about a network.
In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available services on the network that other network devices can listen to. A server sends out SAP messages every 60 seconds. A server also sends out SAP messages to inform other devices that it is closing down. Workstations use SAP to find services they need on the network.
SATAN | A UNIX program that gathers information on networks and stores it in databases. It is |
| helpful in finding security flaws such as incorrect settings, software bugs and poor policy |
decisions. It shows network services that are running, the different types of hardware and software on the network, and other information. It was written to help users find
Glossary of Terms | U |