McAfee VSF08EMB3RUA User Guide - Page 175

hotspot, image filtering, integrated gateway, Internet, intranet, IP address, IP spoofing, keyword

Page 175 highlights

Glossary 173 hotspot A geographic boundary covered by a Wi-Fi (802.11) access point (AP). Users who enter a hotspot with a wireless laptop can connect to the Internet, provided that the hotspot is beaconing (that is, advertising its presence) and authentication is not required. Hotspots are often located in heavily populated areas such as airports. I image filtering A Parental Controls option that blocks potentially inappropriate Web images from appearing. integrated gateway A device that combines the functions of an access point (AP), router, and firewall. Some devices may also include security enhancements and bridging features. Internet The Internet consists of a huge number of interconnected networks that use the TCP/IP protocols for the location and transfer of data. The Internet evolved from a linking of university and college computers (in the late 1960s and early 1970s) funded by the U.S. Department of Defense and called the ARPANET. The Internet today is a global network of almost 100,000 independent networks. intranet A private computer network, usually inside an organization, that can only be accessed by authorized users. IP address An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be 0 to 255 (for example, 192.168.1.100). IP spoofing To forge the IP addresses in an IP packet. This is used in many types of attacks including session hijacking. It is also often used to fake the e-mail headers of SPAM so they cannot be properly traced. K key A series of letters and numbers used by two devices to authenticate their communication. Both devices must have the key. See also WEP, WPA, WPA2, WPA-PSK, and WPA2- PSK. keyword A word that you can assign to a backed up file to establish a relationship or connection with other files that have the same keyword assigned to them. Assigning keywords to files makes it easier to search for files that you have published to the Internet.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

Glossary
173
hotspot
A geographic boundary covered by a Wi-Fi (802.11) access point (AP). Users who enter a
hotspot with a wireless laptop can connect to the Internet, provided that the hotspot is
beaconing (that is, advertising its presence) and authentication is not required. Hotspots
are often located in heavily populated areas such as airports.
I
image filtering
A Parental Controls option that blocks potentially inappropriate Web images from
appearing.
integrated gateway
A device that combines the functions of an access point (AP), router, and firewall. Some
devices may also include security enhancements and bridging features.
Internet
The Internet consists of a huge number of interconnected networks that use the TCP/IP
protocols for the location and transfer of data. The Internet evolved from a linking of
university and college computers (in the late 1960s and early 1970s) funded by the U.S.
Department of Defense and called the ARPANET. The Internet today is a global network of
almost 100,000 independent networks.
intranet
A private computer network, usually inside an organization, that can only be accessed by
authorized users.
IP address
An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP
protocol route messages based on the IP address of the destination. The format of an IP
address is a 32-bit numeric address written as four numbers separated by periods. Each
number can be 0 to 255 (for example, 192.168.1.100).
IP spoofing
To forge the IP addresses in an IP packet. This is used in many types of attacks including
session hijacking. It is also often used to fake the e-mail headers of SPAM so they cannot be
properly traced.
K
key
A series of letters and numbers used by two devices to authenticate their communication.
Both devices must have the key. See also WEP, WPA, WPA2, WPA-PSK, and WPA2- PSK.
keyword
A word that you can assign to a backed up file to establish a relationship or connection with
other files that have the same keyword assigned to them. Assigning keywords to files makes
it easier to search for files that you have published to the Internet.