Cradlepoint ARC CBA850 Product Manual page 150

Cellular broadband adapter
Hide thumbs Also See for ARC CBA850:
Table of Contents

Advertisement

CBA850 | USER MANUAL Firmware version 5.4.0
CRADLEPOINT
L2TP
Layer 2 Tunneling Protocol.
LAN
Local Area Network. A group of computers in a building that
usually access files from a server.
Latency
The amount of time that it takes a packet to get from the one point
to another on a network. Also referred to as delay.
LED
Light Emitting Diode.
Legacy
Older devices or technology.
LLDP
Link Layer Discovery Protocol. A vendor-neutral link layer
protocol in the Internet Protocol Suite used by network devices
for advertising their identity, capabilities, and neighbors on an
IEEE 802 local area network, principally wired Ethernet.
LPR/LPD
Line Printer Requestor/Line Printer Daemon. A TCP/IP protocol
for transmitting streams of printer data.
MAC Address
A unique hardware ID assigned to every Ethernet adapter by the
manufacturer.
Malware
Malware stands for 'malicious software'. It is any type of code or
program cyber attackers use to perform malicious actions.
Traditionally there have been different types of malware based
© 2015 CRADLEPOINT, INC.
PLEASE VISIT
HTTP://KNOWLEDGEBASE.CRADLEPOINT.COM/
on their capabilities and means of propagation, as listed below.
However, these technical distinctions are no longer relevant as
modern malware combines the characteristics from each of these
in a single program.
• Virus: A type of malware that spreads by infecting other
files, rather than existing in a standalone manner. Viruses
often – though not always – spread through human
interaction, such as opening an infected file or application.
• Worm: A type of malware that can propagate automatically,
typically without requiring any human interaction for it to
spread. Worms often spread across networks, though they
can also infect systems through other means, such as USB
keys. An example of a worm is Conficker, which infected
millions of computer systems starting in 2008 and is still
active today.
• Trojan: A shortened form of "Trojan Horse", this type of
malware appears to have a legitimate or at least benign
use, but masks a hidden sinister function. For example, you
may download and install a free screensaver which actually
works well as a screensaver. But that software could also
be malicious, and will infect your computer once you install
it.
• Spyware: A type of malware that is designed to spy on the
victim's activities, capturing sensitive data such as the
person's passwords, online shopping, and screen contents.
One popular type of spyware, a keylogger, is optimized for
logging the victim's keyboard activity and transmitting the
captured information to the remote attacker.
FOR MORE HELP AND RESOURCES
PAGE 148

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents