Front | Back |
PGP (pretty good privacy)
|
Key based encryption system for e-mail that uses a two-step verification process
|
Phishing
|
A practice in which a person attempts to glean access or authentication information by posing as someone who needs that information
|
PKI (public key infrastructure)
|
Use of certificate authorities to associate public keys with certain users.
|
Port authentication
|
Technique in which a client identity is verified by an authentication server before a port, whether physical or logical, is opened for the client's Layers 3 traffic
|
Port forwarding
|
The process of redirecting traffic from its normally assigned port to a different port, either on the clients or server. In the case of using SSH , it can send data exchanges that are normally insecure through encrypted tunnels.
|
Port mirroring
|
Monitoring technique in which one port on a switch is configured to send a copy of all its traffic to a second port
|
Port scanner
|
Software that searches a server, switch, router, or other device for open ports which can be vulnerable to attack
|
Principal
|
In Kerberos terminology , a user or client
|
Private key encryption
|
A type of key encryption in which the sender and receiver use a key to which only they have access. DES which was developed by IBM in the 1970 is a popular example of it. it is also called symmetric encryption
|
Proxy server
|
Network host that runs a proxy service. Proxy servers may also be called gateways
|
Proxy service
|
Software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic and providing one address to the outside world , instead of revealing the addresses of internal LAN devices.
|
Public key encryption
|
Form of key encryption in which data is encrypted using two keys one is a key known only to a user, and the other is a key associated with the user and that can be obtained from a public source, such as a public key server. examples of public key algorithms include RSA and Diffie-Hellman. it is also known as asymmetric encryption
|
Public key server
|
A publicly available host (such as an Internet host) that provides free access to a list of user's public keys
|
RADIUS (Remote Authentication Dial-in User Service)
|
Protocol that runs over UDP and provides centralized network authentication and accounting for multiple user it is commonly used with dial-up networking, VPNs and wireless connection
|
RADIUS server
|
Server that offers centralized authentication services to a network access server, VPN server or wireless access point via the RADIUS protocol
|