Term
| Temporal Key Integrity Protocol (TKIP) |
|
Definition
| Security protocol used in the IEEE 802.11 wireless networking standard. Designed by the IEEE 802.11i task group and the Wi-Fi Alliance as a solution to replace WEP without requiring the replacement of legacy hardware. Generates random values that are used in the encryption process, which makes it much harder for an attacker to break. |
|
|
Term
|
Definition
| Encryption protocol designed for Wireless LAN products that implement the standards of the IEEE 802.11i amendment to the original IEEE 802.11 standard. An enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM) of the AES standard. It was created to address the vulnerabilities presented by TKIP, a protocol in WPA, and WEP, a dated, insecure protocol. |
|
|
Term
|
Definition
| Standard outlines how wireless clients and APs communicate, lays out the specifications of their interfaces, dictates how signal transmission should take place, and describes how authentication, association, and security should be implemented. |
|
|
Term
|
Definition
| Unique ID that consists of 32 characters and is used for naming wireless networks. |
|
|
Term
|
Definition
| Standard that has a maximum raw data rate of 11 Mbit/s and uses the same media access method defined in the original standard. Devices in this range suffer interference from other products operating in the 2.4 GHz band. Devices operating in this range include: microwave ovens, Bluetooth devices, baby monitors and cordless telephones. |
|
|
Term
| Wired Equivalent Privacy (WEP) |
|
Definition
| A security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention is to provide data confidentiality comparable to that of a traditional wired network. IT is widely in use and is often the first security choice presented to users by router configuration tools |
|
|
Term
| Direct Sequence Spread Spectrum DSSS |
|
Definition
| Approach to spread spectrum modulation for digital signal transmission over the airwaves. Stream of information to be transmitted is divided into small pieces, each of which is allocated across to a frequency channel across the spectrum. A data signal at the point of transmission is combined with a higher data-rate bit sequence (also known as a chipping code) that divides the data according to a spreading ratio. |
|
|
Term
| Frequency Hopping Spread Spectrum (FHSS) |
|
Definition
| A method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. It is utilized as a multiple access method in the frequency-hopping code division multiple access (FH-CDMA) scheme. |
|
|
Term
|
Definition
| Standard that enhances the 802.11 Media Access Control layer (MAC layer) with a coordinated time division multiple access (TDMA) construct, and adds error-correcting mechanisms for delay-sensitive applications such as voice and video. Provides seamless interoperability between business, home, and public environments such as airports and hotels, and is especially well suited for use in networks that include multimedia capability. |
|
|
Term
|
Definition
A standard for when a user moves around in a WLAN. • Communication between Access Points (AP) on the “distribution system” • Exchange of information about a mobile station between APs • Maintenance of bridge forwarding tables • Securing the communications between the APs |
|
|
Term
|
Definition
| A standard for wireless local area networks (WLANs) that offers transmission over relatively short distances at up to 54 megabits per second (Mbps), compared with the 11 Mbps theoretical maximum with the earlier 802.11b standard. |
|
|
Term
|
Definition
| Standard that builds upon the 802.11a specification to meet the requirements of European wireless rules so that products working in this range can be properly implemented in European countries. |
|
|
Term
|
Definition
| Standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the 802.11a, 802.11b (which includes Wi-Fi) and 802.11g standards. The 802.11i standard WiMAX, 3G and Wireless Broadband requires new encryption key protocols, known as Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). |
|
|
Term
| Advanced Encryption Standard (AES) |
|
Definition
| Symmetric-key encryption standard that comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. |
|
|
Term
| Lightweight Extensible Authentication Protocol (LEAP). |
|
Definition
| Proprietary wireless LAN authentication method developed by Cisco Systems. Uses dynamic WEP keys and mutual authentication (between a wireless client and a RADIUS server). Allows for clients to reauthenticate frequently; upon each successful authentication, the clients acquire a new WEP key (with the hope that the WEP keys don't live long enough to be cracked). It may be configured to use TKIP instead of dynamic WEP. |
|
|
Term
| Initialization vectors (IVs) |
|
Definition
| A numeric seeding value that is used with the symmetric key and RC4 algorithm to provide more randomness to the encryption process. |
|
|
Term
| Message authentication code (MAC) |
|
Definition
| A security code that is typed in by the user of a computer to access accounts or portals. This code is attached to the message or request sent by the user. It is attached to the message and must be recognized by the receiving system in order to grant the user access. Commonly used in electronic funds transfers (EFTs) to maintain information integrity. |
|
|
Term
| Message Integrity Code(MIC) |
|
Definition
| A short piece of cryptographic checksum used to authenticate a message. It is also known as integrity check-values, modification detection code, or message authentication code. |
|
|
Term
| Integrity Check Value (ICV) |
|
Definition
| A checksum capable of detecting modification of an information system, is the result of the integrity process. This normally involves the HMAC (Hash Message Authentication Code) algorithm and the MD5 (Message Digest 5) or SHA-1 hash functions. |
|
|
Term
|
Definition
| Standard deals with a much smaller geographical network, which is referred to as a wireless personal area network (WPAN). This technology allows for connectivity to take place among local devices, such as a computer communicating with a PDA, a celluar device, or a headset (bluetooth) device. |
|
|
Term
|
Definition
| Standard for a wireless metropolitan area network (MAN), allows for wireless traffic to cover a much wider geographical area. |
|
|
Term
|
Definition
| Sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers. |
|
|
Term
| Wireless Application Protocol (WAP) |
|
Definition
| An industry specification that allows advanced messaging and information services to be delivered to wireless devices independent of which wireless technology they use. |
|
|
Term
| Wireless Transport Layer Security (WTLS) |
|
Definition
| The security layer of the WAP, providing privacy, data integrity and authentication for WAP services. |
|
|
Term
|
Definition
| A mobile internet (as opposed to wireless internet) service popular in Japan |
|
|
Term
|
Definition
Analog, voice-only cellular telephone standard. - 900 MHz - Analog FDMA - Basic telephony - 2.4 Kbps Data Rate - Acoustic coupler interface |
|
|
Term
|
Definition
Standard for second generation of mobile wireless communication technology, which uses the digital technologies for mobile communication. - 1800 MHz - Digital TDMA - Caller ID and voicemail - Text only - Circuit switched (packet switched in 2.5G) - 14.4 Kbps (approx. 115 Kbps in 2.5G) Target Data Rate - 9.6 Kbps (approx. 40 Kbps in 2.5G) real rate - RS232 serial cable or IrDA interface |
|
|
Term
|
Definition
Third generation of wireless technologies standards. Mostly used with mobile phones and handsets as a means to connect the phone to the Internet or other IP networks in order to make voice and video calls, to download and upload data and to surf the net. - 2 GHz - Digital CDMA - Conference calls and low quality video - Graphics and formatted text - Packet switched - 2 Mbps (10 Mbps in 3.5G) Target Data Rate - 64 Kbps.6 Kbps real rate - IEEE 802.11 or Bluetooth |
|
|
Term
|
Definition
Fourth generation of cellular wireless standards. - 40 GHz and 60 GHZ - Digital OFDM - Telepresence and high-definition video - Full unified messaging - IPv6 - 100 Mbps Target Data Rate - Unknown real rate - Seamless connection via multiple methods |
|
|
Term
|
Definition
| Software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. |
|
|
Term
|
Definition
| Software package which automatically plays, displays, or downloads advertisements to a computer. |
|
|
Term
|
Definition
| Malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. Its presence is typically hidden from the user, and can be difficult to detect. |
|
|
Term
|
Definition
| Allows people to communicate with one another through a type of real-time and personal chat room. |
|
|
Term
|
Definition
| A self-replicating program typically designed to perform harm to a computer or network that propagates over instant messaging applications. |
|
|
Term
| Point to Point Tunneling Protocol (PPTP) |
|
Definition
| Method for implementing virtual private networks (VPN). Uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. |
|
|
Term
| Layer 2 Tunneling Protocol (L2TP) |
|
Definition
| Tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. |
|
|
Term
| Internet Protocol Security (IPsec) |
|
Definition
| Protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. It also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. |
|
|
Term
| Point to Point Protocol (PPP) |
|
Definition
| Data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption privacy, and compression. |
|
|
Term
|
Definition
| An internal network that uses web-based technology. |
|
|
Term
|
Definition
| A concentrator in star topologies that serves as the central meeting place for all cables from computers and devices. |
|
|
Term
|
Definition
| Divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understand MAC addresses, not IP addresses. Filters by MAC addresses and forwards broadcast traffic. |
|
|
Term
|
Definition
| Device with combined repeater and bridge technology. It works at the data link layer and understands MAC addresses. |
|
|
Term
|
Definition
| Links two or more network segments, where each segment can function as an independent network. Resides on the network layer, works with IP addresses, and has more network knowledge than bridges, switches, or repeaters. |
|
|
Term
|
Definition
| Loss of signal strength when a cable exceeds its maximum length. |
|
|
Term
| Permanent virtual circuit (PVC) |
|
Definition
| Software-defined logical connection in a network such as a frame relay network. |
|
|
Term
| Switched virtual circuit (SVC) |
|
Definition
| Temporary electrical path created between two points on 'as and when needed' basis. A telephone link created during a call is a example, it is established when the call begins and vanishes when it ends. |
|
|
Term
| Password authentication protocol (PAP) |
|
Definition
| Authentication protocol that uses a password. It is used by PPP to validate users before allowing them access to server resources. Transmits unencrypted ASCII passwords over the network and is therefore considered insecure. |
|
|
Term
| Challenge-Handshake Authentication Protocol (CHAP) |
|
Definition
| Authenticates a user or network host to an authenticating entity. Provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable challenge-value. It requires that both the client and server know the plaintext of the secret, although it is never sent over the network. |
|
|
Term
| Internet Control Message Protocol (ICMP) |
|
Definition
| A core protocol of the Internet Protocol (IP) Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. |
|
|
Term
| Reverse Address Resolution Protocol (RARP) |
|
Definition
| Networking protocol used by a host computer to request its Internet Protocol (IPv4) address from an administrative host, when it has available its Link Layer or hardware address, such as a MAC address. |
|
|
Term
| File Transfer Protocol (FTP) |
|
Definition
| Standard network protocol used to transfer files from one host to another over a TCP-based network, such as the Internet. Operates on the application layer of the OSI model. |
|
|
Term
| Address Resolution Protocol (ARP) |
|
Definition
| Telecommunications protocol used for resolution of network layer addresses into link layer addresses during internetwork transmissions. This function is critical in multiple-access networks for determining link layer addresses when relaying network layer transmissions. |
|
|
Term
| Application Layer Protocols |
|
Definition
| DHCP · DNS · FTP · HTTP · IMAP · IRC · LDAP · MGCP · NNTP · NTP · POP · RIP · RPC · RTP · SIP · SMTP · SNMP · SOCKS · SSH · Telnet · XMPP · |
|
|
Term
|
Definition
| TCP · TLS/SSL · UDP · DCCP · SCTP · RSVP · ECN |
|
|
Term
|
Definition
| IP (IPv4, IPv6) · ICMP · ICMPv6 · IGMP · BGP · OSPF · IPsec |
|
|
Term
|
Definition
| A private network that connects to an external network by using Internet protocols. Is usually set up between partners, suppliers and vendors, and with customers. |
|
|