McAfee MIS09EMB3RAA User Guide - Page 244

encryption, event, external hard drive, file fragments, firewall, home network, hotspot, integrated

Page 244 highlights

242 McAfee Internet Security encryption A method of encoding information so that unauthorized parties cannot access it. When the data is encoded, the process uses a "key" and mathematical algorithms. Encrypted information cannot be decrypted without the proper key. Viruses sometimes use encryption in an attempt to escape detection. ESS Extended service set. Two or more networks that form a single subnetwork. event In a computer system or program, an incident or occurrence that can be detected by security software, according to predefined criteria. Typically an event triggers an action, such as sending a notification or adding an entry to an event log. external hard drive A hard drive that is stored outside of the computer. F file fragments Remnants of a file scattered throughout a disk. File fragmentation occurs as files are added or deleted, and can slow your computer's performance. firewall A system (hardware, software, or both) designed to prevent unauthorized access to or from a private network. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially an intranet. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. H home network Two or more computers that are connected in a home so that they can share files and Internet access. See also LAN (page 243). hotspot A geographic boundary covered by a Wi-Fi (802.11) access point (AP). Users who enter a hotspot with a wireless laptop can connect to the Internet, provided that the hotspot is "beaconing" (advertising its presence) and authentication is not required. Hotspots are often located in heavily populated areas such as airports. I integrated gateway A device that combines the functions of an access point (AP), router, and firewall. Some devices also include security enhancements and bridging features. intranet A private computer network, usually inside an organization, that can be accessed only by authorized users.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

242
McAfee Internet Security
encryption
A method of encoding information so that unauthorized parties cannot access it. When the
data is encoded, the process uses a “key” and mathematical algorithms. Encrypted
information cannot be decrypted without the proper key. Viruses sometimes use
encryption in an attempt to escape detection.
ESS
Extended service set. Two or more networks that form a single subnetwork.
event
In a computer system or program, an incident or occurrence that can be detected by
security software, according to predefined criteria. Typically an event triggers an action,
such as sending a notification or adding an entry to an event log.
external hard drive
A hard drive that is stored outside of the computer.
F
file fragments
Remnants of a file scattered throughout a disk. File fragmentation occurs as files are added
or deleted, and can slow your computer’s performance.
firewall
A system (hardware, software, or both) designed to prevent unauthorized access to or from
a private network. Firewalls are frequently used to prevent unauthorized Internet users
from accessing private networks connected to the Internet, especially an intranet. All
messages entering or leaving the intranet pass through the firewall, which examines each
message and blocks those that do not meet the specified security criteria.
H
home network
Two or more computers that are connected in a home so that they can share files and
Internet access. See also
LAN
(page 243).
hotspot
A geographic boundary covered by a Wi-Fi (802.11) access point (AP). Users who enter a
hotspot with a wireless laptop can connect to the Internet, provided that the hotspot is
“beaconing” (advertising its presence) and authentication is not required. Hotspots are
often located in heavily populated areas such as airports.
I
integrated gateway
A device that combines the functions of an access point (AP), router, and firewall. Some
devices also include security enhancements and bridging features.
intranet
A private computer network, usually inside an organization, that can be accessed only by
authorized users.