Alert!
Headlines
Glossary

Security Glossary

Authentication Establishing the identity of a user for secure e-commerce transactions and virtual private networking.
Broadband A term used to describe any high-speed network that can carry multiple services on the same line, such as data, voice, and video. DSL and cable are broadband.
Content Filtering A content filter allows schools, businesses, and other organizations to set and enforce Acceptable Use Policies (AUPs) governing what materials can and cannot be accessed on the organization’s computers.
Digital Certificates Best method for establishing user identities for e-commerce and virtual private networking.
DoS Denial of Service. A hacker attack designed to disable a server or network by bombarding it with service requests, which prevents legitimate users from accessing the network resource.
DHCP Dynamic Host Configuration Protocol. A protocol that allows IP addressing information to be dynamically assigned by a server to clients on an as-needed basis. IP addresses for the network are stored in a pool of available IP addresses, which are allocated when a computer on the network boots up. The DHCP server functionality is incorporated into routers and works in conjunction with NAT (Network Address Translation).
DNS Domain Name System. The name resolution service for IP addresses that provides the friendlier text based addressing used for Internet resources, such as www.sonicwall.com
DSL Digital Subscriber Line. The generic term that refers to the underlying technology inherent in all flavors of DSL, such as ADSL, SDSL, or ISDL.
Firewall A security device that controls access from the Internet to a local network by using information associated with TCP/IP packets to make decisions about whether to allow or deny access.
ICSA International Computer Security Association. The worldwide leader in security assurance services. ICSA operates the security industry’s product testing and certification body, ICSA Labs.
IP Internet Protocol. The network protocol that forms the basis of the networking functions of the TCP/IP, which is the basis of the Internet.
IPSec Internet Protocol Security. A robust VPN standard that covers authentication and encryption of data traffic over the Internet.
LAN Local Area Network. A data network that connects computers in an area usually within the confines of an office or building. A LAN enables users to share information and network resources, such as a printer or a broadband connection.
NAT Network Address Translation. An Internet standard that allows your local area network to use private IP addresses, which are not recognized on the Internet. The IP address used for the router is the only routable IP address. Computers behind NAT can access the Internet through the router but Internet users can’t access the computers behind the router.
Packet A unit of information that is sent across a packet-switching network, such as the Internet. A data packet contains addressing information, error checking, and user information in addition to the application data.
Proxy Server Session-level firewall that examine the data within IP packets to verify their authenticity. A proxy server accepts or rejects data traffic based on the entire set of IP packets associated with an entire application session to the same IP address. This upper level examination, however, causes significant performance degradation on your Internet connection. Proxy servers require a server and client software on each computer on the LAN.
Packet Filtering Typically implemented on routers, packet filters examine the individual data packets passing across the router. Examining data passing to and from a network, packet filters use rules to block access according to information located in each packet: the IP port number for which data is intended, source or destination address, or data type. A packet filter firewall is complex to set up and maintain and is vulnerable to IP spoofing and other security threats.
Router A device that routes data between networks through IP addressing information contained in data packets. A router forwards packets to other routers until packets reach their destination.
Stateful Packet Inspection Stateful packet inspection firewalls are based on advanced packet-filtering technology that is transparent to users on the LAN, requires no client configuration, and secures the widest array of IP protocols. Stateful Packet Inspection is also well suited to protect networks against the growing threat of Denial of Service attacks. Many network security experts recommend Stateful Packet Inspection as the most trusted firewall technology.
Virus Malicious software programs that attach themselves to applications and files in memory or on disks are a leading security threat to Internet-connected networks. Destructive viral code can infect networked PCs through E-mail attachments, web content or infected files.
VPN Virtual Private Network A way that private data can safely pass over a public network, such as the Internet. The data traveling between two hosts is encrypted for privacy along with other security features.
Recent Projects

DuPage Technology Group - Web Development, Web Design, SEO Services, ColdFusion, Chicago, IL, USA, US, Cold Fusion, PHP, Ruby on Rails, Python, MySQL, DuPage County, Westmont, social networking, cloud computing, Search Engine Optimization, SEO, ecommerce, hosting, IT consulting
Arizona WQA
Florida WQA
Craction.com
Kitty Devine
WQA.org
Dupage Technology Group Partners, Inc.
210A East Chicago Avenue
Suite 240
Westmont, IL, USA 60559
Phone: (630) 968-7424
info@dupagetech.com
Follow Dupage Technology Group on Facebook.com    Follow Dupage Technology Group on Twiter    Follow Dupage Technology Group on YouTube   
DupageTech.com

DupageTech.com

DupageTech.com