Internet+(46)

Back to Home

|| || || || || || || || || || || || || || || || || || || || || || || || || || || Back to Home
 * Asymetric Key || -is used to create a mathematically related key pair: a secret private key and a published public key. Use of this key allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key. It also allows protection of the confidentiality and integrity of a message, by public key encryption, encrypting the message using the public key, which can only be decrypted using the private key.
 * Bandwidth || -is a bit rate measure of available or consumed data communication resources expressed in bits/second or multiples of it (kilobits/s, megabits/s etc.)
 * Certificate || -is an electronic document which uses a digital signature to bind a public key with an identity — information such as the name of a person or an organization, their address, and so forth. The certificate can be used to verify that a public key belongs to an individual. ||
 * Certificate Authority (CA) || -is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or assertions made by the private key that corresponds to the public key that is certified.
 * Cipher or Cypher || -is an algorithm for performing encryption or decryption — a series of well-defined steps that can be followed as a procedure.
 * Ciphertext || -is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. ||
 * Data Encryption Standard (DES) || -is a block cipher that uses shared secret encryption. It is based on a symmetric-key algorithm that uses a 56-bit key and is based on a symmetric-key algorithm that uses a 56-bit key, now considered to be insecure for many applications.
 * Data Packet || -is a formatted unit of data carried by a packet mode computer network. Computer communications links that do not support packets, such as traditional point-to-point telecommunications links, simply transmit data as a series of bytes, characters, or bits alone. When data is formatted into packets, the bitrate of the communication medium can be better shared among users than if the network were circuit switched. By using packet switched networking it is also harder to guarantee a lowest possible bitrate.
 * Dynamic Host Configuration Protocol (DHCP) || -is an auto configuration protocol used on IP networks. It allows a computer to be configured automatically, eliminating the need for intervention by a network administrator. It also provides a central database for keeping track of computers that have been connected to the network. This prevents two computers from accidentally being configured with the same IP address.
 * Dynamic Link Library (DLL) || -is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2 operating systems. These libraries usually have the file extension, (for libraries containing ActiveX controls), or  (for legacy system drivers). As with EXEs, DLLs can contain code, data, and resources, in any combination.
 * Encryption || -is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., //ciphertext//).
 * Extensible Authentication Protocol || -is an authentication framework providing for the transport and usage of keying material and parameters generated by EAP methods. There are many methods defined by RFCs and a number of vendor specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines message formats. Each protocol that uses EAP defines a way to encapsulate EAP messages within that protocol's messages. ||
 * File Transfer Protocol (FTP) || -is a standard network protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server. FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it.
 * File Transfer Protocol Secure (FTPS) || -is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols. FTPS should not be confused with the SSH File Transfer Protocol (SFTP), an incompatible secure file transfer subsystem for the Secure Shell (SSH) protocol. It is also different from Secure FTP, the practice of tunneling FTP through an SSH connection. ||
 * Hypertext Transfer Protocol (HTTP) || -is a networking protocol for distributed, collaborative, hypermedia information systems and functions as a request-response protocol in the client-server computing model. In HTTP, a web browser, for example, acts as a //client//, while an application running on a computer hosting a web site functions as a //server//. The client submits an HTTP //request// message to the server. The server, which stores content, or provides //resources//, such as HTML files and images, or generates such content as required, or performs other functions on behalf of the client, returns a response message to the client. A response contains completion status information about the request and may contain any content requested by the client in its message body.
 * Internet Protocol (IP) || -is the principal communications protocol used for relaying datagrams (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. ||
 * Keypair || -is a pair of cryptographic keys—a public encryption key and a private decryption key.
 * Link || -is a reference to a document that the reader can directly follow, or that is followed automatically.
 * Local Registration Authority (LRA) || -is an optional part of a public key infrastructure that maintains users' identities from which certification authorities can issue digital certificates. A Local Registration Authority (LRA) is the person authorized by their company and the Certificate Authority (FundSERV) to provide certificate lifecycle management. All companies who want to use IDentity services or features must have an LRA. ||
 * Mirroring || -is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization.
 * Personal Identifiers (PID) || -is a subset of personally identifiable information (PII) data elements that identify a unique individual and can permit another person to “assume” that individual’s identity without their knowledge or consent. ||
 * Point-to-Point Protocol (PPP) || -is a data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption privacy, and compression. ||
 * Pretty Good Privacy (PGP) || -is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail communications. ||
 * Proxy Server || -is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client.
 * Private/Public Key || -the publicly available encrypting-key is widely distributed, while the private decrypting-key is known only to the recipient. Messages are encrypted with the recipient's public key and can // only // be decrypted with the corresponding private key. The keys are related mathematically, but the private key cannot feasibly (ie. in actual or projected practice) be derived from the public key.
 * Public Key Infrastructure (PKI) || -is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. ||
 * Registration Authority (RA) || -is a body given the responsibility of maintaining lists of codes under international standards and issuing new codes to those wishing to register them. ||
 * Secure Sockets Layer (SSL) || -is a cryptographic protocols that provides communication security over the Internet. SSL encrypts the segments of network connections by using symmetric cryptography for privacy and a keyed message authentication code for message reliability.
 * Service Set Identifier (SSID) || -is a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters. However, the standard does not require this. The SSID is defined as a sequence of 1–32 octets each of which may take any value. ||
 * Spam || -is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.
 * Spoofing || -is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
 * Symmetric Key || -is a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption etc.
 * Time to Live (TTL) || -is a limit on the period of time or number of iterations or transmissions in computer and computer network technology that a unit of data (e.g. a packet) can experience before it should be discarded. ||
 * Transfer Control Protocol (TCP) || -provides the service of exchanging data directly between two network hosts and provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet applications rely on, applications such as the World Wide Web, e-mail, and file transfer. ||
 * Traceroute (tracert) || -is a computer network tool for measuring the route path and transit times of packets across an Internet Protocol (IP) network.
 * Uniform Resource Identifier (URI) || - is a string of characters used to identify a name or a resource on the Internet. Such identification enables interaction with representations of the resource over a network (typically the World Wide Web) using specific protocols. Schemes specifying a concrete syntax and associated protocols define each URI. ||
 * Uniform Resource Locator (URL) || -specifies where an identified resource is available and the mechanism for retrieving it. The best-known example of the use of URLs is for the //addresses// of web pages on the World Wide Web, such as ﻿ [|http://www.example.com]
 * User Account || -allows a user to authenticate to system services and be granted authorization to access them. ||
 * Wardriving || -is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer or PDA.
 * Web Server || -is what makes it possible to be able to access content like web pages, or other data from anywhere as long as it is connected to the internet. The hardware part is what houses the content, while the software part is what makes the content accessible through the internet. The most common use of web servers are to host websites but there are other uses like data storage or for running enterprise applications. ||
 * Wired Equivalent Privacy (WEP) || -is a deprecated security algorithm for IEEE 802.11 wireless networks. ||
 * Wi-Fi || -is a wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections and is any wireless local area network (WLAN).
 * Wi-Fi Protected Access (WPA) || -is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined the protocol in response to several serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).
 * Wireless Local Area Network (WLAN) || -links two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network.
 * WPA2 || -has replaced WPA and implements the mandatory elements of 802.11i. In particular, it introduces CCMP, a new AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark. ||
 * World Wide Web (WWW) || -is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them via hyperlinks.