McAfee INTERNET SECURITY SUITE 2008 User Manual page 245

Hide thumbs Also See for INTERNET SECURITY SUITE 2008:
Table of Contents

Advertisement

Glossary
243
SSID
(Service Set Identifier) A token (secret key) that identifies a Wi-Fi (802.11) network. The
SSID is set up by the network administrator and must be supplied by users who want to
join the network.
SSL
(Secure Sockets Layer) A protocol developed by Netscape for transmitting private
documents on the Internet. SSL works by using a public key to encrypt data which is
transferred over the SSL connection. URLs that require an SSL connection start with https
instead of http.
standard e-mail account
See POP3.
synchronize
To resolve inconsistencies between backed up files and those stored on your local
computer. You synchronize files when the version of the file in the online backup
repository is newer than the version of the file on the other computers.
system restore point
A snapshot (image) of the contents of the computer's memory or a database. Windows
creates restore points periodically and at the time of significant system events (such as
when a program or driver is installed). You can also create and name your own restore
points at any time.
SystemGuard
McAfee alerts that detect unauthorized changes to your computer and notify you when
they occur.
T
temporary file
A file, created in memory or on disk, by the operating system or some other program, to be
used during a session and then discarded.
TKIP
(Temporal Key Integrity Protocol) A protocol that addresses the weaknesses in WEP
security, especially the reuse of encryption keys. TKIP changes temporal keys every 10,000
packets, providing a dynamic distribution method that significantly enhances the security
of the network. The TKIP (security) process begins with a 128-bit temporal key shared
among clients and access points (APs). TKIP combines the temporal key with the client's)
MAC address, and then adds a relatively large 16-octet initialization vector to produce the
key that encrypts the data. This procedure ensures that each station uses different key
streams to encrypt the data. TKIP uses RC4 to perform the encryption.
Trojan
A program that appears legitimate but can damage valuable files, disrupt performance, and
allow unauthorized access to your computer.

Advertisement

Table of Contents
loading

Table of Contents