Monday, February 18, 2008

Reference

Reference

The Glossary of Terms lists and defines the most commonly used security terminology found in McAfee products.

Glossary of Terms

802.11

A set of IEEE standards for transmitting data across a wireless network. 802.11 is commonly known as Wi-Fi.

802.11a

An extension to 802.11 that transmits data at up to 54 Mbps in the 5GHz band. Although the transmission speed is faster than 802.11b, the distance covered is much smaller.

802.11b

An extension to 802.11 that transmits data at up to 11 Mbps in the 2.4 GHz band. Although the transmission speed is slower than 802.11a, the distance covered is larger.

802.1x

An IEEE standard for authentication on wired and wireless networks. 802.1x is commonly used with 802.11 wireless networking.

Access Point

A network device (commonly called a wireless router) that plugs into an Ethernet hub or switch to extend the physical range of service for a wireless user. When wireless users roam with their mobile devices, transmission passes from one Access Point (AP) to another to maintain connectivity.

ActiveX control

A software component used by programs or Web pages to add functionality that appears as a normal part of the program or Web page. Most ActiveX controls are harmless; however, some may capture information from your computer.

archive

To create a copy of important files on CD, DVD, USB drive, external hard drive, or network drive.

authentication

The process of identifying an individual, usually by a unique name and password.

back up

To create a copy of important files on a secure, online server.

bandwidth

The amount of data that can be transmitted in a fixed amount of time.

blacklist

In anti-phishing, a list of Web sites that are considered fraudulent.

browser

A program used to view Web pages on the Internet. Popular Web browsers include Microsoft Internet Explorer and Mozilla Firefox.

brute-force attack

A method of decoding encrypted data, such as passwords, through exhaustive effort (brute force) rather than intellectual strategy. Brute force is considered an infallible, although time-consuming, attack method. Brute-force attacking is also called brute-force cracking.

buffer overflow

A condition that occurs when suspicious programs or processes try to store more data in a buffer (temporary storage area) on your computer than it can hold. Buffer overflows corrupt or overwrite data in adjacent buffers.

cache

A temporary storage area on your computer. For example, to increase Web browsing speed and efficiency, your browser can retrieve a Web page from its cache (rather than from a remote server) the next time you want to view it.

cipher text

Encrypted text. Cipher text is unreadable until it has been converted into plain text (that is, decrypted).

client

An application that runs on a personal computer or workstation and relies on a server to perform some operations. For example, an e-mail client is an application that lets you send and receive e-mail.

compression

A process by which files are compressed into a form that minimizes the space required to store or transmit it.

content-rating group

In Parental Controls, an age group to which a user belongs. Content is made available or blocked based on the content rating group to which a user belongs. Content rating groups include: Young Child, Child, Younger Teenager, Older Teenager, and Adult.

cookie

A small file containing information, usually including a user name and the current date and time, stored on the computer of a person browsing the Web. Cookies are primarily used by Web sites to identify users who have previously registered on or visited the site; however, they can also be a source of information for hackers.

DAT

(Data signature files) Files containing the definitions that are used when detecting viruses, Trojans, spyware, adware, and other potentially unwanted programs on your computer or USB drive.

deep watch location

A folder on your computer that is monitored for changes by Data Backup. If you set up a deep watch location, Data Backup backs up the watch file types within that folder and its subfolders.

denial of service

A type of attack that slows or halts traffic on a network. A denial of service attack (DoS attack) occurs when a network is flooded with so many additional requests that regular traffic is slowed or completely interrupted. It does not usually result in the theft of information or other security vulnerabilities.

dialer

Software that helps you to establish an Internet connection. When used maliciously, dialers can redirect your Internet connections to someone other than your default Internet Service Provider (ISP), without informing you of additional cost.

dictionary attack

A type of brute-force attack that uses common words to try to discover a password.

DNS

(Domain Name System) A system that converts host names or domain names to IP addresses. On the Web, DNS is used to convert easily legible Web address (for example, www.myhostname.com) to IP addresses (for example, 111.2.3.44) so that the Web site can be retrieved. Without DNS, you would have to type the IP address itself into your Web browser.

DNS server

(Domain Name System server) A computer that returns the IP address associated with a host or domain name. See also DNS.

domain

A local subnetwork or a descriptor for sites on the Internet.

On a local area network (LAN), a domain is a subnetwork made up of client and server computers controlled by one security database. In this context, domains can improve performance. On the Internet, a domain is part of every Web address (for example, in www.abc.com, abc is the domain).

e-mail

(electronic mail) Messages sent and received electronically, across a computer network. See also Webmail.

e-mail client

A program that you run on your computer to send and receive e-mail (for example, Microsoft Outlook).

encryption

A process by which data is transformed from text to code, obscuring the information to make it unreadable by people who do not know how to decrypt it. Encrypted data is also known as cipher text.

ESS

(Extended Service Set) A set of two or more networks that form a single subnetwork.

event

An action initiated either by the user, a device, or the computer itself which triggers a response. McAfee records events in its event log.

external hard drive

A hard drive that is stored outside of the computer.

file fragments

Remnants of a file scattered throughout a disk. File fragmentation occurs as files are added or deleted, and can slow your computer's performance.

firewall

A system (hardware, software, or both) designed to prevent unauthorized access to or from a private network. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially an intranet. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

full archive

To archive a complete set of data based on the file types and locations that you have set up. See also quick archive.

home network

Two or more computers that are connected in a home so that they can share files and Internet access. See also LAN.

hotspot

A geographic boundary covered by a Wi-Fi (802.11) access point (AP). Users who enter a hotspot with a wireless laptop can connect to the Internet, provided that the hotspot is beaconing (that is, advertising its presence) and authentication is not required. Hotspots are often located in heavily populated areas such as airports.

image filtering

A Parental Controls option that blocks potentially inappropriate Web images from appearing.

integrated gateway

A device that combines the functions of an access point (AP), router, and firewall. Some devices may also include security enhancements and bridging features.

Internet

The Internet consists of a huge number of interconnected networks that use the TCP/IP protocols for the location and transfer of data. The Internet evolved from a linking of university and college computers (in the late 1960s and early 1970s) funded by the U.S. Department of Defense and called the ARPANET. The Internet today is a global network of almost 100,000 independent networks.

intranet

A private computer network, usually inside an organization, that can only be accessed by authorized users.

IP address

An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be 0 to 255 (for example, 192.168.1.100).

IP spoofing

To forge the IP addresses in an IP packet. This is used in many types of attacks including session hijacking. It is also often used to fake the e-mail headers of SPAM so they cannot be properly traced.

key

A series of letters and numbers used by two devices to authenticate their communication. Both devices must have the key. See also WEP, WPA, WPA2, WPA-PSK, and WPA2- PSK.

keyword

A word that you can assign to a backed up file to establish a relationship or connection with other files that have the same keyword assigned to them. Assigning keywords to files makes it easier to search for files that you have published to the Internet.

LAN

(Local Area Network) A computer network that spans a relatively small area (for example, a single building). Computers on a LAN can communicate with each other and share resources such as printers and files.

launchpad

A U3 interface component that acts as a starting point for launching and managing U3 USB programs.

library

An online storage area for files that you have backed up and published. The Data Backup library is a Web site on the Internet, accessible to anyone with Internet access.

MAC address

(Media Access Control address) A unique serial number assigned to a physical device accessing the network.

man-in-the-middle attack

A method of intercepting and possibly modifying messages between two parties without either party knowing that their communication link has been breached.

managed network

A home network with two types of members: managed members and unmanaged members. Managed members allow other computers on the network to monitor their protection status; unmanaged members do not.

MAPI

(Messaging Application Programming Interface) A Microsoft interface specification that allows different messaging and workgroup applications (including e-mail, voice mail, and fax) to work through a single client, such as the Exchange client.

message authentication code (MAC)

A security code used to encrypt messages that are transmitted between computers. The message is accepted if the computer recognizes the decrypted code as valid.

MSN

(Microsoft Network) A group of Web-based services offered by Microsoft Corporation, including a search engine, e-mail, instant messaging, and portal.

network

A collection of Access Points and their associated users, equivalent to an ESS.

network drive

A disk or tape drive that is connected to a server on a network that is shared by multiple users. Network drives are sometimes called remote drives.

network map

A graphical representation of the computers and components that make up a home network.

NIC

(Network Interface Card) A card that plugs into a laptop or other device and connects the device to the LAN.

node

A single computer connected to a network.

on-demand scan

A scan that is launched on demand (that is, when you launch the operation). Unlike real-time scanning, on-demand scans do not launch automatically.

online backup repository

The location on the online server where your files are stored after they are backed up.

Parental Controls

Settings that help regulate what your children can see and do while they browse the Web. To set up Parental Controls, you can enable or disable image filtering, choose a content rating group, and set Web browsing time limits.

password

A code (usually consisting of letters and numbers) you use to gain access to your computer, a program, or a Web site.

Password Vault

A secure storage area for your personal passwords. It allows you to store your passwords with confidence that no other user (even an administrator) can access them.

PCI wireless adapter cards

(Peripheral Component Interconnect) A wireless adapter card that plugs into a PCI expansion slot inside the computer.

phishing

An Internet scam designed to obtain valuable information (such as credit card and social security numbers, user IDs, and passwords) from unknowing individuals for fraudulent use.

plain text

Text that is not encrypted. See also encryption.

plug-in

A small software program that works with a larger program to provide added functionality. For example, plug-ins permit a Web browser to access and execute files embedded in HTML documents that are in formats the browser normally would not recognize (for example, animation, video, and audio files).

pop-ups

Small windows that appear on top of other windows on your computer screens. Pop-up windows are often used in Web browsers to display advertisements.

POP3

(Post Office Protocol 3) An interface between an e-mail client program and the e-mail server. Most home users have a POP3 e-mail account, also known as standard e-mail account.

port

A place where information goes into and/or out of a computer. For example, a conventional analog modem is connected to a serial port.

potentially unwanted program (PUP)

A program that gathers and transmits personal information without your permission (for example, spyware and adware).

PPPoE

(Point-to-Point Protocol Over Ethernet) A method of using the Point-to-Point Protocol (PPP) dial-up protocol with Ethernet as the transport.

protocol

A format (hardware or software) for transmitting data between two devices. Your computer or device must support the correct protocol if you want to communicate with other computers.

proxy

A computer (or the software that runs on it) that acts as a barrier between a network and the Internet by presenting only a single network address to external sites. By representing all internal computers, the proxy protects network identities while still providing access to the Internet. See also proxy server.

proxy server

A firewall component that manages Internet traffic to and from a local area network (LAN). A proxy server can improve performance by supplying frequently requested data, such as a popular Web page, and can filter and discard requests that the owner does not consider appropriate, such as requests for unauthorized access to proprietary files.

publish

To make a backed up file available publicly, on the Internet. You can access published files by searching the Data Backup library.

quarantine

To isolate. For example, in VirusScan, suspect files are detected and quarantined so that they cannot cause harm to your computer or files.

quick archive

To archive only those files that have changed since the last full or quick archive. See also full archive.

RADIUS

(Remote Access Dial-In User Service) A protocol that allows user authentication, usually in the context of remote access. Originally defined for use with dial-in remote access servers, the RADIUS protocol is now used in a variety of authentication environments, including 802.1x authentication of a WLAN user's shared secret.

real-time scanning

To scan files and folders for viruses and other activity when they are accessed by you or your computer.

Recycle Bin

A simulated garbage can for deleted files and folders in Windows.

registry

A database in which Windows stores its configuration information. The registry contains profiles for each computer user and information about system hardware, installed programs, and property settings. Windows continually references this information during its operation.

restore

To retrieve a copy of a file from the online backup repository or an archive.

roaming

To move from one Access Point (AP) coverage area to another without interruption in service or loss in connectivity.

rogue access point

An unauthorized Access Point. Rogue access points can be installed on a secure company network to grant network access to unauthorized parties. They can also be created to allow an attacker to conduct a man-in-the-middle attack.

rootkit

A collection of tools (programs) that grant a user administrator-level access to a computer or computer network. Rootkits may include spyware and other potentially unwanted programs that can create additional security or privacy risks to your computer data and personal information.

router

A network device that forwards data packets from one network to another. Based on internal routing tables, routers read each incoming packet and decide how to forward it based on any combination of source and destination address as well as current traffic conditions (for example, load, line costs, and bad lines). A router is sometimes called an Access Point (AP).

script

A list of commands that can be executed automatically (that is, without user interaction). Unlike programs, scripts are typically stored in their plain text form and compiled each time they are run. Macros and batch files are also called scripts.

server

A computer or program that accepts connections from other computers or programs and returns appropriate responses. For example, your e-mail program connects to an e-mail server each time you send or receive e-mail messages.

shallow watch locations

A folder on your computer that is monitored for changes by Data Backup. If you set up a shallow watch location, Data Backup backs up the watch file types within that folder, but does not include its subfolders.

share

To allow e-mail recipients to access selected backed up files for a limited period of time. When you share a file, you send the backed up copy of the file to the e-mail recipients that you specify. Recipients receive an e-mail message from Data Backup indicating that files have been shared with them. The e-mail also contains a link to the shared files.

shared secret

A string or key (usually a password) that has been shared between two communicating parties prior to initiating communication. A shared secret is used to protect sensitive portions of RADIUS messages.

shortcut

A file that contains only the location of another file on your computer.

smart drive

See USB drive.

SMTP

(Simple Mail Transfer Protocol) A TCP/IP protocol for sending messages from one computer to another on a network. This protocol is used on the Internet to route e-mail.

SSID

(Service Set Identifier) A token (secret key) that identifies a Wi-Fi (802.11) network. The SSID is set up by the network administrator and must be supplied by users who want to join the network.

SSL

(Secure Sockets Layer) A protocol developed by Netscape for transmitting private documents on the Internet. SSL works by using a public key to encrypt data which is transferred over the SSL connection. URLs that require an SSL connection start with https instead of http.

standard e-mail account

See POP3.

synchronize

To resolve inconsistencies between backed up files and those stored on your local computer. You synchronize files when the version of the file in the online backup repository is newer than the version of the file on the other computers.

system restore point

A snapshot (image) of the contents of the computer's memory or a database. Windows creates restore points periodically and at the time of significant system events (such as when a program or driver is installed). You can also create and name your own restore points at any time.

SystemGuard

McAfee alerts that detect unauthorized changes to your computer and notify you when they occur.

temporary file

A file, created in memory or on disk, by the operating system or some other program, to be used during a session and then discarded.

TKIP

(Temporal Key Integrity Protocol) A protocol that addresses the weaknesses in WEP security, especially the reuse of encryption keys. TKIP changes temporal keys every 10,000 packets, providing a dynamic distribution method that significantly enhances the security of the network. The TKIP (security) process begins with a 128-bit temporal key shared among clients and access points (APs). TKIP combines the temporal key with the client's) MAC address, and then adds a relatively large 16-octet initialization vector to produce the key that encrypts the data. This procedure ensures that each station uses different key streams to encrypt the data. TKIP uses RC4 to perform the encryption.

Trojan

A program that appears legitimate but can damage valuable files, disrupt performance, and allow unauthorized access to your computer.

trusted list

Contains items that you trusted and are not being detected. If you trust an item (for example, a potentially unwanted program or a registry change) by mistake, or you want the item to be detected again, you must remove it from this list.

U3

(You: Simplified, Smarter, Mobile) A platform for running Windows 2000 or Windows XP programs directly from a USB drive. The U3 initiative was founded in 2004 by M-Systems and SanDisk and allows users to run U3 programs on a Windows computer without installing or storing data or settings on the computer.

URL

(Uniform Resource Locator) The standard format for Internet addresses.

USB

(Universal Serial Bus) A standardized serial computer interface that allows you to attach peripheral devices such as keyboards, joysticks, and printers to your computer.

USB drive

A small memory drive that plugs into a computer's USB port. A USB drive acts like a small disk drive, making it easy to transfer files from one computer to another.

USB wireless adapter card

A wireless adapter card that plugs into a USB slot in the computer.

virus

Self-replicating programs that might alter your files or data. They often appear to be from a trusted sender or to contain benign content.

VPN

(Virtual Private Network) A private network configured within a public network so as to take advantage of the management facilities of the public network. VPNs are used by enterprises to create wide area networks (WANs) that span large geographic areas, to provide site-to-site connections to branch offices, or to allow mobile users to dial into their company LANs.

wardriver

A person who searches for Wi-Fi (802.11) networks by driving through cities armed with a Wi-Fi computer and some special hardware or software.

watch file types

The types of files (for example, .doc, .xls, and so on) that Data Backup backs up or archives within the watch locations.

watch locations

The folders on your computer that Data Backup monitors.

Web bugs

Small graphics files that can embed themselves in your HTML pages and allow an unauthorized source to set cookies on your computer. These cookies can then transmit information to the unauthorized source. Web bugs are also called Web beacons, pixel tags, clear GIFs, or invisible GIFs.

Webmail

Messages sent and received electronically, across the Internet. See also e-mail.

WEP

(Wired Equivalent Privacy) An encryption and authentication protocol defined as part of the Wi-Fi (802.11) standard. Initial versions are based on RC4 ciphers and have significant weaknesses. WEP attempts to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed.

whitelist

A list of Web sites that users are allowed to access because the Web sites are not considered fraudulent.

Wi-Fi

(Wireless Fidelity) A term used by the Wi-Fi Alliance when referring to any type of 802.11 network.

Wi-Fi Alliance

An organization comprised of leading wireless hardware and software providers. The Wi-Fi Alliance strives to certify all 802.11-based products for interoperability and promote the term Wi-Fi as the global brand name across all markets for any 802.11-based wireless LAN products. The organization serves as a consortium, testing laboratory, and clearinghouse for vendors who want to promote the growth of the industry.

Wi-Fi Certified

To be tested and approved by the Wi-Fi Alliance. Wi-Fi Certified products are deemed interoperable even though they may originate from different manufacturers. A user with a Wi-Fi Certified product can use any brand of Access Point (AP) with any other brand of client hardware that also is certified.

wireless adapter

A device that adds wireless capability to a computer or PDA. It is attached via a USB port, PC Card (CardBus) slot, memory card slot, or internally into the PCI bus.

WLAN

(Wireless Local Area Network) A local area network (LAN) using a wireless connection. A WLAN uses high-frequency radio waves rather than wires to allow computers to communicate with each other.

worm

A self-replicating virus that resides in active memory and can send copies of itself through e-mail. Worms replicate and consume system resources, slowing performance or halting tasks.

WPA

(Wi-Fi Protected Access) A specification standard that strongly increases the level of data protection and access control for existing and future wireless LAN systems. Designed to run on existing hardware as a software upgrade, WPA is derived from, and is compatible with, the IEEE 802.11i standard. When properly installed, it provides wireless LAN users with a high level of assurance that their data remains protected and that only authorized network users can access the network.

WPA-PSK

A special WPA mode designed for home users who do not require strong enterprise-class security and do not have access to authentication servers. In this mode, the home user manually enters the starting password to activate Wi-Fi Protected Access in Pre-Shared Key mode, and should change the pass-phrase on each wireless computer and Access Point regularly. See also WPA2-PSK and TKIP.

WPA2

An update to the WPA security standard, based on the 802.11i IEEE standard.

WPA2-PSK

A special WPA mode that is similar to WPA-PSK and is based on the WPA2 standard. A common feature of WPA2-PSK is that devices often support multiple encryption modes (for example, AES, TKIP) simultaneously, while older devices generally support only a single encryption mode at a time (that is, all clients would have to use the same encryption mode).

No comments: