ZyXEL P-964 User Guide - Page 46

A PAC must

Page 46 highlights

P964 APR Cable Sharing Gateway with 4-port Switch IRC ISP LAN Linux Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system to "chat" over the network. Today IRC is a very popular way to "talk" in real time with other people on the Internet. However, IRC is also one avenue hackers use to get information from you about your system and your company. Moreover, IRC sessions are prone to numerous attacks that while not dangerous can cause your system to crash. Internet Service Providers provide connections into the Internet for home users and businesses. There are local, regional, national, and global ISPs. You can think of local ISPs as the gatekeepers into the Internet. Local Area Network is a shared communication system to which many computers are attached. A LAN, as its name implies, is limited to a local area. This has to do more with the electrical characteristics of the medium than the fact that many early LANs were designed for departments, although the latter accurately describes a LAN as well. LANs have different topologies, the most common being the linear bus and the star configuration. A version of the UNIX operating system designed to run on IBM Compatible computers. Logic Bomb MAC MCNS MSO Name Resolution NAT NDIS NetBIOS Network NIC Node One-way Cable Modem PAC Packet Filter PAP Password Cracker Password encryption Password Shadowing Penetration Phreaking Ping Attack Pirate A virus that only activates itself when certain conditions are met. Logic bombs usually damage files or cause other serious problems when they are activated. On a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) The MAC layer frames data for transmission over the network, then passes the frame to the physical layer interface where it is transmitted as a stream of bits. Multimedia Cable Network System is the consortium behind the DOCSIS standard for cable modems. Multiple Service Operators. A cable TV service provider that also provides other services such as data and/or voice telephony. The allocation of an IP address to a host name. See DNS Network Address Translation is the translation of an Internet Protocol address used within one network to a different IP address known within another network - see also SUA. Network Driver Interface Specification is a Windows specification for how communication protocol programs (such as TCP/IP) and network device drivers should communicate with each other. Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a PC to connect to and communicate with a LAN. Any time you connect 2 or more computers together so that they can share resources, you have a computer network. Connect 2 or more networks together and you have an internet. Network Interface Card. A board that provides network communication capabilities to and from a computer system. Also called an adapter. Any single computer connected to a network A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone modem for upstream (transmit). The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must have IP and dial-up capability. A filter that scans packets and decides whether to let them through. Password Authentication Protocol PAP is a security protocol that requires users to enter a password before accessing a secure system. The user's name and password are sent over the wire to a server, where they are compared with a database of user account names and passwords. This technique is vulnerable to wiretapping (eavesdropping) because the password can be captured and used by someone to log onto the system. A program that uses a dictionary of words, phrases, names, etc. to guess a password. A system of encrypting electronic files using a single key or password. Anyone who knows the password can decrypt the file. The encrypted password is no visible in the passwd file but stored in a shadow file that is only readable by root. This prevents brute force attacks on the encrypted field to guess the password. see e.g.: http://whatis.com/shadowpa.htm Gaining access to computers or networks by bypassing security programs and passwords. Breaking into phone or other communication systems. Phreaking sites on the Internet are popular among crackers and other criminals An attack that slows down the network until it is unusable. The attacker sends a "ping" command to the network repeatedly to slow it down. See also Denial of Service. Someone who steals or distributes software without paying the legitimate owner for it. This category of computer criminal includes several different types of illegal activities Making copies of software for others to use. Distributing pirated software over the Internet or a Bulletin Board System. Receiving or downloading illegal copies of software in any form. H Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51

P964 APR Cable Sharing Gateway with 4-port Switch
H
Glossary
IRC
Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system
to “chat” over the network. Today IRC is a very popular way to “talk” in real time with other
people on the Internet. However, IRC is also one avenue hackers use to get information from you
about your system and your company. Moreover, IRC sessions are prone to numerous attacks
that while not dangerous can cause your system to crash.
ISP
Internet Service Providers provide connections into the Internet for home users and businesses.
There are local, regional, national, and global ISPs. You can think of local ISPs as the
gatekeepers into the Internet.
LAN
Local Area Network is a shared communication system to which many computers are attached. A
LAN, as its name implies, is limited to a local area. This has to do more with the electrical
characteristics of the medium than the fact that many early LANs were designed for departments,
although the latter accurately describes a LAN as well. LANs have different topologies, the most
common being the linear bus and the star configuration.
Linux
A version of the UNIX operating system designed to run on IBM Compatible computers.
Logic Bomb
A virus that only activates itself when certain conditions are met. Logic bombs usually damage
files or cause other serious problems when they are activated.
MAC
On a local area network (LAN) or other network, the MAC (Media Access Control) address is
your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet
address.) The MAC layer frames data for transmission over the network, then passes the frame to
the physical layer interface where it is transmitted as a stream of bits.
MCNS
Multimedia Cable Network System is the consortium behind the DOCSIS standard for cable
modems.
MSO
Multiple Service Operators. A cable TV service provider that also provides other services such as
data and/or voice telephony.
Name Resolution
The allocation of an IP address to a host name. See DNS
NAT
Network Address Translation is the translation of an Internet Protocol address used within one
network to a different IP address known within another network - see also SUA.
NDIS
Network Driver Interface Specification is a Windows specification for how communication
protocol programs (such as TCP/IP) and network device drivers should communicate with each
other.
NetBIOS
Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a
PC to connect to and communicate with a LAN.
Network
Any time you connect 2 or more computers together so that they can share resources, you have a
computer network. Connect 2 or more networks together and you have an internet.
NIC
Network Interface Card. A board that provides network communication capabilities to and from a
computer system. Also called an adapter.
Node
Any single computer connected to a network
One-way Cable
Modem
A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone
modem for upstream (transmit).
PAC
The box that calls/answers the phone call and relays the PPP frames to the PNS.
A PAC must
have IP and dial-up capability.
Packet Filter
A filter that scans packets and decides whether to let them through.
PAP
Password Authentication Protocol PAP is a security protocol that requires users to enter a
password before accessing a secure system. The user’s name and password are sent over the wire
to a server, where they are compared with a database of user account names and passwords. This
technique is vulnerable to wiretapping (eavesdropping) because the password can be captured
and used by someone to log onto the system.
Password Cracker
A program that uses a dictionary of words, phrases, names, etc. to guess a password.
Password encryption
A system of encrypting electronic files using a single key or password. Anyone who knows the
password can decrypt the file.
Password
Shadowing
The encrypted password is no visible in the passwd file but stored in a shadow file that is only
readable by root. This prevents brute force attacks on the encrypted field to guess the password.
see e.g.:
http://whatis.com/shadowpa.htm
Penetration
Gaining access to computers or networks by bypassing security programs and passwords.
Phreaking
Breaking into phone or other communication systems. Phreaking sites on the Internet are popular
among crackers and other criminals
Ping Attack
An attack that slows down the network until it is unusable. The attacker sends a "ping" command
to the network repeatedly to slow it down. See also Denial of Service.
Pirate
Someone who steals or distributes software without paying the legitimate owner for it. This
category of computer criminal includes several different types of illegal activities Making copies
of software for others to use. Distributing pirated software over the Internet or a Bulletin Board
System. Receiving or downloading illegal copies of software in any form.