Cradlepoint MBR1400 Product Manual page 263

Hide thumbs Also See for MBR1400:
Table of Contents

Advertisement

MBR1400 | USER MANUAL – Firmware version 5.0
CRADLEPOINT
RJ-11
The most commonly used connection method for
telephones.
RJ-45
The most commonly used connection method for Ethernet.
RS-232C
The
interface
for
computers and other related devices.
RSA
Algorithm used for encryption and authentication.
Server
A computer on a network that provides services and
resources to other computers on the network.
Session key
An encryption and decryption key that is generated for
every communication session between two computers.
Session layer
The fifth layer of the OSI model which coordinates the
connection and communication between applications on
both ends.
Simple Mail Transfer Protocol
Used for sending and receiving email.
Simple Network Management Protocol
Governs the management and monitoring of network
devices.
© 2013 CRADLEPOINT, INC.
serial
communication
between
PLEASE VISIT
HTTP://KNOWLEDGEBASE.CRADLEPOINT.COM/
SIP
Session Initiation Protocol. A standard protocol for
initiating a user session that involves multimedia content,
such as voice or chat.
SMTP
Simple Mail Transfer Protocol.
SNMP
Simple Network Management Protocol.
Social Engineering
A psychological attack used by cyber attackers to deceive
their victims into taking an action that will place the victim
at risk. For example, cyber attackers may trick you into
revealing your password or fool you into installing
malicious software on your computer. They often do this
by pretending to be someone you know or trust, such as a
bank, company or even a friend.
SOHO
Small Office/Home Office.
Spam
Unwanted or unsolicited emails, typically sent to numerous
recipients with the hope of enticing people to read the
embedded advertisements, click on a link or open an
attachment. Spam is often used to convince recipients to
purchase illegal or questionable products and services,
such as pharmaceuticals from fake companies. Spam is
also often used to distribute malware to potential victims.
FOR MORE HELP AND RESOURCES
PAGE 261

Advertisement

Table of Contents
loading

Table of Contents