Brother International HL-3075CW Network Users Manual - English - Page 92

Security features, Overview, Security terms

Page 92 highlights

Security features14 14 Security features 14 Overview 14 In today's world there are many security threats to your network and the data that travels over it. Your Brother machine employs some of the latest network security and encryption protocols available today. These network features can be integrated into your overall network security plan to help protect your data and prevent unauthorized access to the machine. This chapter explains various security protocols supported and how to configure them. Security terms 14 „ CA (Certificate Authority) A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the binding between the data items in a certificate. „ CSR (Certificate Signing Request) A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSR contains information identifying the applicant, the public key generated by the applicant and the digital signature of the applicant. „ Certificate A Certificate is the information that binds together a public key with an identity. The certificate can be used to verify that a public key belongs to an individual. The format is defined by the x.509 standard. „ Digital signature A Digital signature is a value computed with a cryptographic algorithm and appended to a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity. „ Public key cryptosystem A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm. „ Shared key cryptosystem A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two 14 different steps of the algorithm (such as encryption and decryption). 82

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143

82
14
14
Security features14
Overview
14
In today’s world there are many security threats to your network and the data that travels over it. Your Brother
machine employs some of the latest network security and encryption protocols available today. These
network features can be integrated into your overall network security plan to help protect your data and
prevent unauthorized access to the machine. This chapter explains various security protocols supported and
how to configure them.
Security terms
14
CA (Certificate Authority)
A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the binding
between the data items in a certificate.
CSR (Certificate Signing Request)
A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSR
contains information identifying the applicant, the public key generated by the applicant and the digital
signature of the applicant.
Certificate
A Certificate is the information that binds together a public key with an identity. The certificate can be used
to verify that a public key belongs to an individual. The format is defined by the x.509 standard.
Digital signature
A Digital signature is a value computed with a cryptographic algorithm and appended to a data object in
such a way that any recipient of the data can use the signature to verify the data's origin and integrity.
Public key cryptosystem
A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of
keys (a public key and a private key) and use a different component of the pair for different steps of the
algorithm.
Shared key cryptosystem
A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two
different steps of the algorithm (such as encryption and decryption).
Security features
14