Brother International HL 4040CN Network Users Manual - English - Page 131

Security features, Overview, Security terms

Page 131 highlights

12 Security features 12 Overview 12 In today's world there are many security threats to your network and the data that travels over it. Your Brother printer employs some of the latest network security and encryption protocols available today. These network features can be integrated into your overall network security plan to help protect your data and prevent unauthorized access to the printer. This chapter explains that various security protocols supported and how to configure them. Security terms 12 „ CA (Certificate Authority) A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the binding between the data items in a certificate. „ CSR (Certificate Signing Request) A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSR contains information identifying the applicant, the public key generated by the applicant and the digital signature of the applicant. „ Certificate A Certificate is the information that binds together a public key with an identity. The certificate can be used to verify that a public key belongs to an individual. The format is defined by the x.509 standard. „ Digital signature A Digital signature is a value computed with a cryptographic algorithm and appended to a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity. „ Public key cryptosystem 12 A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm. „ Shared key cryptosystem A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two different steps of the algorithm (such as encryption and decryption). 124

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177

124
12
12
Overview
12
In today’s world there are many security threats to your network and the data that travels over it. Your Brother
printer employs some of the latest network security and encryption protocols available today. These network
features can be integrated into your overall network security plan to help protect your data and prevent
unauthorized access to the printer. This chapter explains that various security protocols supported and how
to configure them.
Security terms
12
CA (Certificate Authority)
A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the binding
between the data items in a certificate.
CSR (Certificate Signing Request)
A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSR
contains information identifying the applicant, the public key generated by the applicant and the digital
signature of the applicant.
Certificate
A Certificate is the information that binds together a public key with an identity. The certificate can be used
to verify that a public key belongs to an individual. The format is defined by the x.509 standard.
Digital signature
A Digital signature is a value computed with a cryptographic algorithm and appended to a data object in
such a way that any recipient of the data can use the signature to verify the data's origin and integrity.
Public key cryptosystem
A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of
keys (a public key and a private key) and use a different component of the pair for different steps of the
algorithm.
Shared key cryptosystem
A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two
different steps of the algorithm (such as encryption and decryption).
Security features
12