Term
Advanced Configuration and Power Interface (ACPI) |
|
Definition
A power management standard, developed by Microsoft, Intel, and Toshiba, which enables a computers operating system to regulate the power consumption of specific system components, based on input received from an application, a device driver, or a user. |
|
|
Term
Advanced Encryption Standard (AES) |
|
Definition
A cryptographic algorithm used in the Wi-Fi Protected Access 2 (WPA2) wireless networking security protocol. |
|
|
Term
BitLocker Drive Encryption |
|
Definition
A feature included with the Windows 7 Enterprise and Ultimate editions that Microsoft designed to address the problem of compromised data that when a computer is lost or stolen. |
|
|
Term
data recovery agent (DRA) |
|
Definition
A user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card. |
|
|
Term
|
Definition
A new remote access solution in Windows 7 and Windows Server 2008 R2 that enables clients to remain connected to their host networks whenever they have access to the Internet, reconnecting automatically whenever it is necessary. |
|
|
Term
|
Definition
A series of standards published by the Institute of Electrical and Electronics Engineers that define wireless networking protocols using various technologies and running at various speeds. |
|
|
Term
IKEv2 Mobility and Multihoming (MOBIKE) |
|
Definition
A protocol on which the Windows 7 VPN Reconnect feature is based. |
|
|
Term
Institute of Electrical and Electronic Engineers (IEEE) |
|
Definition
A body of engineering and electronics professionals that is best known for publishing standards defining a wide variety of networking and other technologies. |
|
|
Term
Internet Key Exchange, Version 2 (IKEv2) |
|
Definition
A virtual private networking protocol that is new in Windows 7 and Windows Server 2008 R2, uses TCP port 500, and provides support for IPv6 and the new VPN Reconnect feature, as well as authentication by EAP, using PEAP, EAP-MSCHAPv2, or smart cards. |
|
|
Term
Layer 2 Tunneling Protocol (L2TP) |
|
Definition
A virtual private networking protocol that relies on the IP security extensions (IPsec) for encryption, and as a result performs a double encapsulation. |
|
|
Term
multiple-input multiple-output (MIMO) |
|
Definition
A wireless networking technology that increases wireless networking speeds by using multiple transmitter and receiver antennae on each device. |
|
|
Term
Point-to-Point Protocol (PPP) |
|
Definition
A communications protocol used in dial-up connections that takes the place of the Ethernet protocol at the data-link layer, by encapsulating the datagrams created by the Internet Protocol (IP) at the network layer, to prepare them for their transmission. |
|
|
Term
Point-to-Point Tunneling Protocol (PPTP) |
|
Definition
A virtual private networking protocol that takes advantage of the authentication, compression, and encryption mechanisms of PPP, tunneling the PPP frame within a Generic Routing Encapsulation (GRE) header and encrypting it with Microsoft Point-to-Point Encryption (MPPE), using encryption keys generated during the authentication process. |
|
|
Term
Secure Socket Tunneling Protocol (SSTP) |
|
Definition
A virtual private networking protocol that encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol supported by virtually all web servers. |
|
|
Term
|
Definition
A transmission system in which the sending system splits its data into two signals for transmission, and the receiving device reassembles the signals into a single data stream. |
|
|
Term
Temporal Key Integrity Protocol (TKIP) |
|
Definition
An encryption option for Wifi Protected Access Protocol, TKIP encrypts data using the RC4 algorithm with a 128-bit key. |
|
|
Term
Trusted Platform Module (TPM) |
|
Definition
A dedicated cryptographic processor chip that the system uses to store the BitLocker encryption keys. |
|
|
Term
virtual private network (VPN) |
|
Definition
A client/server connection in which the remote client and the remote access server are both connected to the Internet, using local service providers. |
|
|
Term
|
Definition
A new Windows 7 feature that enables a computer to reconnect to a VPN server automatically, after an interruption as long as eight hours. |
|
|
Term
WiFi Protected Access (WPA) |
|
Definition
One of two main security protocols used in the wireless LAN devices on the market today. WPA is comparatively recent and secure, but some older devices do not support it. |
|
|
Term
Wired Equivalent Privacy (WEP) |
|
Definition
One of two main security protocols used in the wireless LAN devices on the market today. WEP has been around for some time and is relatively insecure, but it is supported by virtually all wireless LAN products. |
|
|