D-Link DWS-1008 Product Manual - Page 476

protocol according to Public Key Cryptography Standard PKCS #10. The CSR contains the information

Page 476 highlights

CPC - Communications plenum cable See plenum-rated cable. CRC - Cyclic redundancy check. A primitive message integrity check. crypto - See cryptography. cryptography - The science of information security. Modern cryptography is typically concerned with the processes of scrambling ordinary text (known as plain text or clear text) into encrypted text at the sender's end of a connection, and decrypting the encrypted text back into clear text at the receiver's end. Because its security is independent of the channels through which the text passes, cryptography is the only way of protecting communications over channels that are not under the user's control. The goals of cryptography are confidentiality, integrity, nonrepudiation, and authentication.The encrypted information cannot be understood by anyone for whom it is not intended, or altered in storage or transmission without the alteration being detected. The sender cannot later deny the creation or transmission of the information, and the sender and receiver can confirm each other's identity and the information's origin and destination. CSR - Certificate Signing Request. A message sent by an administrator to request a security certificate from a certificate authority (CA). A CSR is a text string formatted by Privacy-Enhanced Mail (PEM) protocol according to Public Key Cryptography Standard (PKCS) #10. The CSR contains the information needed by the certificate authority to generate the certificate. CSV file - Comma-separated values file. A text file that displays tabular data in a comma-delimited format, as a list of rows in which each column's value is separated from the next by a comma. A CSV file is useful for transferring data between database applications. cyclic redundancy check - See CRC. dBm - Decibels referred to 1 milliwatt (mW). A measurement of relative power related to 1 mW. For example, 20 dBm corresponds to 1020 dBm/10 = 100 mW. decibels - referred to 1 milliwatt (mW). See dBm. Data Encryption Standard - See DES. delivery traffic indication map - See DTIM. DES - Data Encryption Standard. A federally approved symmetric encryption algorithm in use for many years and replaced by the Advanced Encryption Standard (AES). See also 3DES. DHCP - Dynamic Host Configuration Protocol. A protocol that dynamically assigns IP addresses to stations, from a centralized server. DHCP is the successor to the Bootstrap Protocol (BOOTP). dictionary attack - An attempt to gain illegal access to a computer or network by logging in repeatedly with passwords that are based on a list of terms in a dictionary. D-Link DWS-1008 User Manual 457

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502

D-Link DWS-1008 User Manual
³´¶
CPC -
Communications plenum cable
See plenum-rated cable.
CRC
- Cyclic redundancy check. A primitive message integrity check.
crypto
- See cryptography.
cryptography
- The science of information security. Modern cryptography is typically concerned with
the processes of scrambling ordinary text (known as plain text or clear text) into encrypted text at the
sender’s end of a connection, and decrypting the encrypted text back into clear text at the receiver’s end.
Because its security is independent of the channels through which the text passes, cryptography is the
only way of protecting communications over channels that are not under the user’s control. The goals of
cryptography are confidentiality, integrity, nonrepudiation, and authentication. The encrypted information
cannot be understood by anyone for whom it is not intended, or altered in storage or transmission
without the alteration being detected. The sender cannot later deny the creation or transmission of the
information, and the sender and receiver can confirm each other’s identity and the information’s origin
and destination.
CSR
- Certificate Signing Request. A message sent by an administrator to request a security certificate
from a certificate authority (CA). A CSR is a text string formatted by Privacy-Enhanced Mail (PEM)
protocol according to Public Key Cryptography Standard (PKCS) #10. The CSR contains the information
needed by the certificate authority to generate the certificate.
CSV file
- Comma-separated values file. A text file that displays tabular data in a comma-delimited
format, as a list of rows in which each column’s value is separated from the next by a comma. A CSV
file is useful for transferring data between database applications.
cyclic redundancy check
- See CRC.
dBm
- Decibels referred to 1 milliwatt (mW). A measurement of relative power related to 1 mW. For
example, 20 dBm corresponds to 1020 dBm/10 = 100 mW.
decibels
- referred to 1 milliwatt (mW). See dBm.
Data Encryption Standard
- See DES.
delivery traffic indication ma
p - See DTIM.
DES
- Data Encryption Standard. A federally approved symmetric encryption algorithm in use for many
years and replaced by the Advanced Encryption Standard (AES). See also 3DES.
DHCP
- Dynamic Host Configuration Protocol. A protocol that dynamically assigns IP addresses to
stations, from a centralized server. DHCP is the successor to the Bootstrap Protocol (BOOTP).
dictionary attack
- An attempt to gain illegal access to a computer or network by logging in repeatedly
with passwords that are based on a list of terms in a dictionary.