ZyXEL P-964 User Guide - Page 43

Glossary of Terms

Page 43 highlights

P964 APR Cable Router with 802.11g Access Point 10BaseT ARP Authenticity Back Door Backbone BackOrifice Glossary of Terms The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair cabling (Category 3 or 5): one pair for transmitting data and the other for receiving data. Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. Proof that the information came from the person or location that reportedly sent it. One example of authenticating software is through digital signatures. A deliberately planned security breach in a program. Back doors allow special access to a computer or program. Sometimes back doors can be exploited and allow a cracker unauthorized access to data. A high-speed line or series of connections that forms a major pathway within a network. BackOrifice is a remote administration tool which allows a user to control a computer across a TCP/IP connection using a simple console or GUI application. BackOrifice is a potentially disastrous Trojan horse since it can provide the user unlimited access to a system. Bandwidth Bit Brute Force Hacking This is the capacity on a link usually measured in bits-per-second (bps). (Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a zero. The smallest unit of computerized data. A technique used to find passwords or encryption keys. Force Hacking involves trying every possible combination of letters, numbers, etc. until the code is broken. Byte Cable Modem (CM) Camping Out A set of bits that represent a single character. There are 8 bits in a Byte. A cable modem is a device that enables you to hook up your computer to a local cable TV line and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56 Kbps telephone modems, and up to 128 Kbps of ISDN that is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone service. A cable modem can be added to or integrated with a set top box that turns your TV set into an Internet channel. For computer attachment, the cable line must be split so that part of the line goes to the TV set and the other part goes to the cable modem and the computer. A cable modem is more like a network interface card (NIC) than a computer modem. All of the cable modems attached to a cable TV company coaxial cable line communicate with a Cable Modem Termination System (CMTS) at the local cable TV company office. All cable modems can receive only from and send signals to the CMTS, but not to other cable modems on the line. Staying in a "safe" place once a hacker has broken into a system. The term can be used with a physical location, electronic reference, or an entry point for future attacks. CATV Cable TV system. Can be all coaxial- or HFC- (Hybrid Fiber Coax) based. CDR Channel CHAP Cipher Text Client CMTS Call Detail Record. This is a name used by telephone companies for call related information. A specific frequency and bandwidth combination. In the present context, it means TV channels for television services and downstream data for cable modems. Challenge Handshake Authentication Protocol is an alternative protocol that avoids sending passwords over the wire by using a challenge/response technique. Text that has been scrambled or encrypted so that it cannot be read without deciphering it. See Encryption A software program that is used to contact and obtain data from a Server software program on another computer. Each Client program is designed to work with one or more specific kinds of Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific kind of Client. Cable Modem Termination System. A central device for connecting the cable TV network to a data network like the Internet. Normally it is placed in the headend of the cable TV system. Cookie Countermeasures CPE Cracker A string of characters saved by a web browser on the user's hard disk. Many web pages send cookies to track specific user information. Cookies can be used to retain information as the user browses a web site. For example, cookies are used to 'remember' the items a shopper may have in a shopping cart. Techniques, programs, or other tools that can protect your computer against threats. Customer Premises Equipment. Used to describe the computer and/or other equipment that the customer may want to connect to the cable modem. Another term for hackers. Generally, the term cracker refers specifically to a person who maliciously attempts to break encryption, software locks, or network security. Glossary E

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51

P964 APR
Cable Router with 802.11g Access Point
Glossary
E
Glossary of Terms
10BaseT
The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair cabling
(Category 3 or 5): one pair for transmitting data and the other for receiving data.
ARP
Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP address) to
a physical machine address that is recognized in the local network.
Authenticity
Proof that the information came from the person or location that reportedly sent it. One example
of authenticating software is through digital signatures.
Back Door
A deliberately planned security breach in a program. Back doors allow special access to a
computer or program. Sometimes back doors can be exploited and allow a cracker unauthorized
access to data.
Backbone
A high-speed line or series of connections that forms a major pathway within a network.
BackOrifice
BackOrifice is a remote administration tool which allows a user to control a
computer across a TCP/IP connection using a simple console or GUI application. BackOrifice is
a potentially disastrous Trojan horse since it can provide the user unlimited access to a system.
Bandwidth
This is the capacity on a link usually measured in bits-per-second (bps).
Bit
(Binary Digit) -- A single digit number in base-2, in other words, either a 1 or a zero. The
smallest unit of computerized data.
Brute Force Hacking
A technique used to find passwords or encryption keys. Force Hacking involves trying every
possible combination of letters, numbers, etc. until the code is broken.
Byte
A set of bits that represent a single character. There are 8 bits in a Byte.
Cable Modem (CM)
A cable modem is a device that enables you to hook up your computer to a local cable TV line
and receive data at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56
Kbps telephone modems, and up to 128 Kbps of ISDN that is about the data rate available to
subscribers of Digital Subscriber Line (DSL) telephone service. A cable modem can be added to
or integrated with a set top box that turns your TV set into an Internet channel. For computer
attachment, the cable line must be split so that part of the line goes to the TV set and the other
part goes to the cable modem and the computer.
A cable modem is more like a network interface card (NIC) than a computer modem. All of the
cable modems attached to a cable TV company coaxial cable line communicate with a Cable
Modem Termination System (CMTS) at the local cable TV company office. All cable modems
can receive only from and send signals to the CMTS, but not to other cable modems on the line.
Camping Out
Staying in a "safe" place once a hacker has broken into a system. The term
can be used with a physical location, electronic reference, or an entry point for future attacks.
CATV
Cable TV system. Can be all coaxial- or HFC- (Hybrid Fiber Coax) based.
CDR
Call Detail Record. This is a name used by telephone companies for call related information.
Channel
A specific frequency and bandwidth combination. In the present context, it means TV channels
for television services and downstream data for cable modems.
CHAP
Challenge Handshake Authentication Protocol is an alternative protocol that avoids sending
passwords over the wire by using a challenge/response technique.
Cipher Text
Text that has been scrambled or encrypted so that it cannot be read without deciphering it. See
Encryption
Client
A software program that is used to contact and obtain data from a Server software program on
another computer. Each Client program is designed to work with one or more specific kinds of
Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific
kind of Client.
CMTS
Cable Modem Termination System. A central device for connecting the cable TV network to a
data network like the Internet. Normally it is placed in the headend of the cable TV system.
Cookie
A string of characters saved by a web browser on the user's hard disk. Many web pages send
cookies to track specific user information. Cookies can be used to retain information as the user
browses a web site. For example, cookies are used to 'remember' the items a shopper may have in
a shopping cart.
Countermeasures
Techniques, programs, or other tools that can protect your computer against threats.
CPE
Customer Premises Equipment. Used to describe the computer and/or other equipment that the
customer may want to connect to the cable modem.
Cracker
Another term for hackers. Generally, the term cracker refers specifically to a person who
maliciously attempts to break encryption, software locks, or network security.