Cradlepoint ARC CBA850 Product Manual page 154

Cellular broadband adapter
Hide thumbs Also See for ARC CBA850:
Table of Contents

Advertisement

CBA850 | USER MANUAL Firmware version 5.4.0
CRADLEPOINT
SMTP
Simple Mail Transfer Protocol. Used for sending and receiving
email.
SNMP
Simple Network Management Protocol. Governs the management
and monitoring of network devices.
Social Engineering
A psychological attack used by cyber attackers to deceive their
victims into taking an action that will place the victim at risk. For
example, cyber attackers may trick you into revealing your
password or fool you into installing malicious software on your
computer. They often do this by pretending to be someone you
know or trust, such as a bank, company or even a friend.
SOHO
Small Office/Home Office.
Spam
Unwanted or unsolicited emails, typically sent to numerous
recipients with the hope of enticing people to read the embedded
advertisements, click on a link or open an attachment. Spam is
often used to convince recipients to purchase illegal or
questionable products and services, such as pharmaceuticals
from fake companies. Spam is also often used to distribute
malware to potential victims.
Spear Phishing
Spear phishing describes a type of phishing attack that targets
specific victims. But instead of sending out an email to millions of
email addresses, cyber attackers send out a very small number
of crafted emails to very specific individuals, usually all at the
© 2015 CRADLEPOINT, INC.
PLEASE VISIT
HTTP://KNOWLEDGEBASE.CRADLEPOINT.COM/
same organization. Because of the targeted nature of this attack,
spear phishing attacks are often harder to detect and usually
more effective at fooling the victims.
SPI
Stateful Packet Inspection. A feature of a firewall that monitors
outgoing and incoming traffic to ensure that only valid responses
to outgoing requests are allowed to pass though the firewall.
SSH
Secure Shell. A command line interface that allows for secure
connections to remote computers.
SSID
Service Set Identifier is a name for a wireless network.
Subnet mask
Determines what portion of an IP address designates the Network
and which part designates the Host.
Syslog
System Logger. A distributed logging interface for collecting in
one place the logs from different sources. Originally written for
UNIX, it is now available for other operating systems, including
Windows.
TCP
Transmission Control Protocol.
TCP Raw
A TCP/IP protocol for transmitting streams of printer data.
TCP/IP
Transmission Control Protocol/Internet Protocol.
FOR MORE HELP AND RESOURCES
PAGE 152

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents