Term
Advanced Configuration and Power Interface (ACPI) |
|
Definition
Is an industry specification for the efficient handling of power consumption in desktop and mobile computers. Specifies how a computer's basic input/output system, operating system, and peripheral devices communicate with each other about power usage. Microsoft refers to its support as "Always On." |
|
|
Term
Advanced Encryption System (AES) |
|
Definition
Implemented in the WPA2 standard, uses a different and more secure enctyption alofrithm, called CCMP. |
|
|
Term
BitLocker Drive Encryption |
|
Definition
First introduced in Vista and is in 7 Ultimate and 7 Enterprise, is a feature that makes it possible to encrypt an entire volume |
|
|
Term
Data recovery agent (DRA) |
|
Definition
Is a user account that an admin has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card. |
|
|
Term
|
Definition
Is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. |
|
|
Term
|
Definition
Standards that are published by the IEEE. They dictate the frequencies, transmission speeds, and ranges of wireless networking products. |
|
|
Term
IKEv2 Mobility and Multihoming (MOBIKE) |
|
Definition
Allows a mobile node encrypting traffic through IKEv2 to change point of attachment while maintaining a Virtual Private Network (VPN) session. |
|
|
Term
Institute of Electrical and Electronic Engineers (IEEE) |
|
Definition
An organization that continually develops standards for the networking and communications industry. |
|
|
Term
Internet Key Exchange, Version 2 (IKEv2) |
|
Definition
An authentication protocol that identifies the identity of both the client and server to each other. Once the identity of both sides is established, one or more IPSec based SAs are established between them for data transfer. Is considered a strong authentication protocol. |
|
|
Term
|
Definition
Is a collection of IP extensions that provide additional security for networks communications. DirectAccess relies on it to authenticate users and computers and to encrypt data exchanged by clients and servers. |
|
|
Term
Layer 2 Tunneling Protocol (L2TP) |
|
Definition
Is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. |
|
|
Term
Multiple-input multiple-output (MIMO) |
|
Definition
A design in newer routers that provides for faster wireless data transmission by utilizing more than one antenna to transmit and receive data. |
|
|
Term
|
Definition
Is a form of fault tolerance that individuals users can employ to maintain access to their server files, even in the event of a network service failure. |
|
|
Term
Point-to-Point Protocol (PPP) |
|
Definition
Is a connection between the clients and the server, during which the server authenticates the client and the computer negotiate a set of communication parameters they have in common. |
|
|
Term
Point-to-Point Tunneling Protocol (PPTP) |
|
Definition
Enables the secure transfer of data from a remote computer to a private server by creating a VPN connection across IP-based data networks. |
|
|
Term
Secure Password (EAP-MSCHAPv2) |
|
Definition
One of three types of EAP-based authentication supported by Windows 7, the default selection for new connections, and the strongest password-based mechanism in Windows 7. |
|
|
Term
Secure Socket Tunneling Protocol (SSTP) |
|
Definition
A protocol that allows secure communication between a VPN client and server using the SSL based encryption methods of HTTPS. The connection between client and server is not likely to be stopped by a fi rewall because the HTTPS protocol is not commonly blocked. |
|
|
Term
|
Definition
Sending system splitting data into two signals for transmission, and the receiving device reassembles the signals into a single data stream |
|
|
Term
Temporal Key Integrity Protocol (TKIP) |
|
Definition
Encrypts data using the RC4 algorithm with a 128-bit key. It has the same algorithm as WEP but eliminates WEP's most exploited vulnerability by using a unique encryption key for each packet. |
|
|
Term
|
Definition
Is functionally similar to the BranchCache feature, except that each Windows 7 workstation has exclusive use of its own cache; it does not share the cached files with other clients. |
|
|
Term
Trusted Platform Module (TPM) |
|
Definition
Is a special microchip, installed on a motherboard, that stores passwords, keys, and digital certificates. Various services, such as BitLocker can store such security data in this chip. (16) |
|
|
Term
|
Definition
The process by which VPNs transfer information by encapsulating traffic in IP packets over the Internet. |
|
|
Term
Virtual private network (VPN) |
|
Definition
The client established a connection to the server using the Internet as a network medium and, after authentication, the server grants the client access to the network. |
|
|
Term
|
Definition
Enables a remote computer to automatically re-establish a connection to a VPN server running Windows Server 2008 R2. |
|
|
Term
Wifi Protected Access (WPA and WPA2) |
|
Definition
Is a security standard to secure computers connected to a Wi-Fi network. Its purpose is to achieve complete compliance with the IEEE802.11i standard. Will not work with some older network cards, thus the need for concurrent security standards. |
|
|
Term
Wired Equivalent Privacy (WEP) |
|
Definition
The oldest of the Wi-Fi encryption standards. It uses 64- or 128-bit encryption that is easily broken. It does not encrypt the actual data in a packet, and it does not perform user authentication on a packet. (16) |
|
|