Term
Temporal Key Integrity Protocol (TKIP) |
|
Definition
Security protocol used in the IEEE 802.11 wireless networking standard. Designed by the IEEE 802.11i task group and the Wi-Fi Alliance as a solution to replace WEP without requiring the replacement of legacy hardware. Generates random values that are used in the encryption process, which makes it much harder for an attacker to break. |
|
|
Term
|
Definition
Encryption protocol designed for Wireless LAN products that implement the standards of the IEEE 802.11i amendment to the original IEEE 802.11 standard. An enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM) of the AES standard. It was created to address the vulnerabilities presented by TKIP, a protocol in WPA, and WEP, a dated, insecure protocol. |
|
|
Term
|
Definition
Standard outlines how wireless clients and APs communicate, lays out the specifications of their interfaces, dictates how signal transmission should take place, and describes how authentication, association, and security should be implemented. |
|
|
Term
|
Definition
Unique ID that consists of 32 characters and is used for naming wireless networks. |
|
|
Term
|
Definition
Standard that has a maximum raw data rate of 11 Mbit/s and uses the same media access method defined in the original standard. Devices in this range suffer interference from other products operating in the 2.4 GHz band. Devices operating in this range include: microwave ovens, Bluetooth devices, baby monitors and cordless telephones. |
|
|
Term
Wired Equivalent Privacy (WEP) |
|
Definition
A security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention is to provide data confidentiality comparable to that of a traditional wired network. IT is widely in use and is often the first security choice presented to users by router configuration tools |
|
|
Term
Direct Sequence Spread Spectrum DSSS |
|
Definition
Approach to spread spectrum modulation for digital signal transmission over the airwaves. Stream of information to be transmitted is divided into small pieces, each of which is allocated across to a frequency channel across the spectrum. A data signal at the point of transmission is combined with a higher data-rate bit sequence (also known as a chipping code) that divides the data according to a spreading ratio. |
|
|
Term
Frequency Hopping Spread Spectrum (FHSS) |
|
Definition
A method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. It is utilized as a multiple access method in the frequency-hopping code division multiple access (FH-CDMA) scheme. |
|
|
Term
|
Definition
Standard that enhances the 802.11 Media Access Control layer (MAC layer) with a coordinated time division multiple access (TDMA) construct, and adds error-correcting mechanisms for delay-sensitive applications such as voice and video. Provides seamless interoperability between business, home, and public environments such as airports and hotels, and is especially well suited for use in networks that include multimedia capability. |
|
|
Term
|
Definition
A standard for when a user moves around in a WLAN. • Communication between Access Points (AP) on the “distribution system” • Exchange of information about a mobile station between APs • Maintenance of bridge forwarding tables • Securing the communications between the APs |
|
|
Term
|
Definition
A standard for wireless local area networks (WLANs) that offers transmission over relatively short distances at up to 54 megabits per second (Mbps), compared with the 11 Mbps theoretical maximum with the earlier 802.11b standard. |
|
|
Term
|
Definition
Standard that builds upon the 802.11a specification to meet the requirements of European wireless rules so that products working in this range can be properly implemented in European countries. |
|
|
Term
|
Definition
Standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the 802.11a, 802.11b (which includes Wi-Fi) and 802.11g standards. The 802.11i standard WiMAX, 3G and Wireless Broadband requires new encryption key protocols, known as Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). |
|
|
Term
Advanced Encryption Standard (AES) |
|
Definition
Symmetric-key encryption standard that comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. |
|
|
Term
Lightweight Extensible Authentication Protocol (LEAP). |
|
Definition
Proprietary wireless LAN authentication method developed by Cisco Systems. Uses dynamic WEP keys and mutual authentication (between a wireless client and a RADIUS server). Allows for clients to reauthenticate frequently; upon each successful authentication, the clients acquire a new WEP key (with the hope that the WEP keys don't live long enough to be cracked). It may be configured to use TKIP instead of dynamic WEP. |
|
|
Term
Initialization vectors (IVs) |
|
Definition
A numeric seeding value that is used with the symmetric key and RC4 algorithm to provide more randomness to the encryption process. |
|
|
Term
Message authentication code (MAC) |
|
Definition
A security code that is typed in by the user of a computer to access accounts or portals. This code is attached to the message or request sent by the user. It is attached to the message and must be recognized by the receiving system in order to grant the user access. Commonly used in electronic funds transfers (EFTs) to maintain information integrity. |
|
|
Term
Message Integrity Code(MIC) |
|
Definition
A short piece of cryptographic checksum used to authenticate a message. It is also known as integrity check-values, modification detection code, or message authentication code. |
|
|
Term
Integrity Check Value (ICV) |
|
Definition
A checksum capable of detecting modification of an information system, is the result of the integrity process. This normally involves the HMAC (Hash Message Authentication Code) algorithm and the MD5 (Message Digest 5) or SHA-1 hash functions. |
|
|
Term
|
Definition
Standard deals with a much smaller geographical network, which is referred to as a wireless personal area network (WPAN). This technology allows for connectivity to take place among local devices, such as a computer communicating with a PDA, a celluar device, or a headset (bluetooth) device. |
|
|
Term
|
Definition
Standard for a wireless metropolitan area network (MAN), allows for wireless traffic to cover a much wider geographical area. |
|
|
Term
|
Definition
Sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers. |
|
|
Term
Wireless Application Protocol (WAP) |
|
Definition
An industry specification that allows advanced messaging and information services to be delivered to wireless devices independent of which wireless technology they use. |
|
|
Term
Wireless Transport Layer Security (WTLS) |
|
Definition
The security layer of the WAP, providing privacy, data integrity and authentication for WAP services. |
|
|
Term
|
Definition
A mobile internet (as opposed to wireless internet) service popular in Japan |
|
|
Term
|
Definition
Analog, voice-only cellular telephone standard. - 900 MHz - Analog FDMA - Basic telephony - 2.4 Kbps Data Rate - Acoustic coupler interface |
|
|
Term
|
Definition
Standard for second generation of mobile wireless communication technology, which uses the digital technologies for mobile communication. - 1800 MHz - Digital TDMA - Caller ID and voicemail - Text only - Circuit switched (packet switched in 2.5G) - 14.4 Kbps (approx. 115 Kbps in 2.5G) Target Data Rate - 9.6 Kbps (approx. 40 Kbps in 2.5G) real rate - RS232 serial cable or IrDA interface |
|
|
Term
|
Definition
Third generation of wireless technologies standards. Mostly used with mobile phones and handsets as a means to connect the phone to the Internet or other IP networks in order to make voice and video calls, to download and upload data and to surf the net. - 2 GHz - Digital CDMA - Conference calls and low quality video - Graphics and formatted text - Packet switched - 2 Mbps (10 Mbps in 3.5G) Target Data Rate - 64 Kbps.6 Kbps real rate - IEEE 802.11 or Bluetooth |
|
|
Term
|
Definition
Fourth generation of cellular wireless standards. - 40 GHz and 60 GHZ - Digital OFDM - Telepresence and high-definition video - Full unified messaging - IPv6 - 100 Mbps Target Data Rate - Unknown real rate - Seamless connection via multiple methods |
|
|
Term
|
Definition
Software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. |
|
|
Term
|
Definition
Software package which automatically plays, displays, or downloads advertisements to a computer. |
|
|
Term
|
Definition
Malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. Its presence is typically hidden from the user, and can be difficult to detect. |
|
|
Term
|
Definition
Allows people to communicate with one another through a type of real-time and personal chat room. |
|
|
Term
|
Definition
A self-replicating program typically designed to perform harm to a computer or network that propagates over instant messaging applications. |
|
|
Term
Point to Point Tunneling Protocol (PPTP) |
|
Definition
Method for implementing virtual private networks (VPN). Uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. |
|
|
Term
Layer 2 Tunneling Protocol (L2TP) |
|
Definition
Tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. |
|
|
Term
Internet Protocol Security (IPsec) |
|
Definition
Protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. It also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. |
|
|
Term
Point to Point Protocol (PPP) |
|
Definition
Data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption privacy, and compression. |
|
|
Term
|
Definition
An internal network that uses web-based technology. |
|
|
Term
|
Definition
A concentrator in star topologies that serves as the central meeting place for all cables from computers and devices. |
|
|
Term
|
Definition
Divides networks into more controllable segments to ensure more efficient use of bandwidth. Works at the data link layer and understand MAC addresses, not IP addresses. Filters by MAC addresses and forwards broadcast traffic. |
|
|
Term
|
Definition
Device with combined repeater and bridge technology. It works at the data link layer and understands MAC addresses. |
|
|
Term
|
Definition
Links two or more network segments, where each segment can function as an independent network. Resides on the network layer, works with IP addresses, and has more network knowledge than bridges, switches, or repeaters. |
|
|
Term
|
Definition
Loss of signal strength when a cable exceeds its maximum length. |
|
|
Term
Permanent virtual circuit (PVC) |
|
Definition
Software-defined logical connection in a network such as a frame relay network. |
|
|
Term
Switched virtual circuit (SVC) |
|
Definition
Temporary electrical path created between two points on 'as and when needed' basis. A telephone link created during a call is a example, it is established when the call begins and vanishes when it ends. |
|
|
Term
Password authentication protocol (PAP) |
|
Definition
Authentication protocol that uses a password. It is used by PPP to validate users before allowing them access to server resources. Transmits unencrypted ASCII passwords over the network and is therefore considered insecure. |
|
|
Term
Challenge-Handshake Authentication Protocol (CHAP) |
|
Definition
Authenticates a user or network host to an authenticating entity. Provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable challenge-value. It requires that both the client and server know the plaintext of the secret, although it is never sent over the network. |
|
|
Term
Internet Control Message Protocol (ICMP) |
|
Definition
A core protocol of the Internet Protocol (IP) Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. |
|
|
Term
Reverse Address Resolution Protocol (RARP) |
|
Definition
Networking protocol used by a host computer to request its Internet Protocol (IPv4) address from an administrative host, when it has available its Link Layer or hardware address, such as a MAC address. |
|
|
Term
File Transfer Protocol (FTP) |
|
Definition
Standard network protocol used to transfer files from one host to another over a TCP-based network, such as the Internet. Operates on the application layer of the OSI model. |
|
|
Term
Address Resolution Protocol (ARP) |
|
Definition
Telecommunications protocol used for resolution of network layer addresses into link layer addresses during internetwork transmissions. This function is critical in multiple-access networks for determining link layer addresses when relaying network layer transmissions. |
|
|
Term
Application Layer Protocols |
|
Definition
DHCP · DNS · FTP · HTTP · IMAP · IRC · LDAP · MGCP · NNTP · NTP · POP · RIP · RPC · RTP · SIP · SMTP · SNMP · SOCKS · SSH · Telnet · XMPP · |
|
|
Term
|
Definition
TCP · TLS/SSL · UDP · DCCP · SCTP · RSVP · ECN |
|
|
Term
|
Definition
IP (IPv4, IPv6) · ICMP · ICMPv6 · IGMP · BGP · OSPF · IPsec |
|
|
Term
|
Definition
A private network that connects to an external network by using Internet protocols. Is usually set up between partners, suppliers and vendors, and with customers. |
|
|