18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Glossary</strong><br />

BSD/OS The operation system obtained from Wind River, Inc., and used as a base<br />

for developing SecureOS. See also SecureOS<br />

burb A set <strong>of</strong> one or more interfaces and the group <strong>of</strong> systems connected to<br />

each interface that are to be treated the same from a system security<br />

policy point <strong>of</strong> view.<br />

certificate See digital certificate.<br />

Certificate Authority<br />

(CA)<br />

CGI (common gateway<br />

interface)<br />

A highly trusted entity, that issues and revokes certificates for a set <strong>of</strong><br />

subjects, and is ultimately responsible for their authenticity.<br />

Any server-side code that accepts data from forms via HTTP. The forms<br />

are generally on Web pages and submitted by end users.<br />

challenge A set <strong>of</strong> random numbers generated by the computer being accessed. The<br />

numbers are entered into the authenticator, which then generates a<br />

password. You can set some authenticators to generate a password in<br />

response to a challenge.<br />

cipher key In order for encryption to be unique, it uses a random set <strong>of</strong> characters,<br />

called a cipher key. Encrypting data using two different keys will produce<br />

two completely different results. All authenticators contain at least one<br />

key that they use to generate passwords.<br />

circuit proxy See network-layer proxy.<br />

client A program or user that requests network service(s) from a server.<br />

Configuration Wizard A Windows-based program that allows you to create an initial<br />

configuration for your <strong>Sidewinder</strong> <strong>G2</strong> or <strong>G2</strong> Enterprise Manager.<br />

daemon A s<strong>of</strong>tware routine within UNIX that runs in the background, performing<br />

system-wide functions.<br />

daemond (Pronounced daimon-dee) A powerful <strong>Sidewinder</strong> <strong>G2</strong> component process<br />

that enhances overall security by monitoring and controlling all <strong>of</strong> the<br />

<strong>Sidewinder</strong> <strong>G2</strong>’s major s<strong>of</strong>tware components. It also detects and audits<br />

some classes <strong>of</strong> attacks against the <strong>Sidewinder</strong> <strong>G2</strong>.<br />

dark data center A term used to describe a data process facility where all machines are<br />

designed to be managed remotely. This type <strong>of</strong> facility maximizes storage<br />

space by rack-mounting computers and minimizes overhead costs by not<br />

needing lights. Machines stored in a dark data center ideally require<br />

minimal physical human interaction.<br />

<strong>Glossary</strong> G-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!