ZyWALL 10 Internet Security Gateway
10BaseT
The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair cabling
(Category 3 or 5): one pair for transmitting data and the other for receiving data.
ARP
Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP
address) to a physical machine address that is recognized in the local network.
Authenticity
example of authenticating software is through digital signatures.
Back Door
A deliberately planned security breach in a program. Back doors allow special access to
a computer or program. Sometimes back doors can be exploited and allow a cracker
unauthorized access to data.
Backbone
A high-speed line or series of connections that forms a major pathway within a network.
BackOrifice
BackOrifice is a remote administration tool which allows a user to control a
computer across a TCP/IP connection using a simple console or GUI application.
BackOrifice is a potentially disastrous Trojan horse since it can provide the user
unlimited access to a system.
Bandwidth
This is the capacity on a link usually measured in bits-per-second (bps).
Bit
(Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a zero. The
smallest unit of computerized data.
Brute Force
A technique used to find passwords or encryption keys. Force Hacking involves trying
Hacking
every possible combination of letters, numbers, etc. until the code is broken.
Byte
A set of bits that represent a single character. There are 8 bits in a Byte.
Camping Out
Staying in a "safe" place once a hacker has broken into a system. The term
can be used with a physical location, electronic reference, or an entry point for future
attacks.
CDR
Call Detail Record. This is a name used by telephone companies for call related
information.
CHAP
Challenge Handshake Authentication Protocol is an alternative protocol that avoids
sending passwords over the wire by using a challenge/response technique.
Cipher Text
Text that has been scrambled or encrypted so that it cannot be read without deciphering
it. See Encryption
Client
A software program that is used to contact and obtain data from a Server software
program on another computer. Each Client program is designed to work with one or
more specific kinds of Server programs, and each Server requires a specific kind of
Client. A Web Browser is a specific kind of Client.
N
Proof that the information came from the person or location that reportedly sent it. One
Glossary of Terms
Glossary of Terms