User guide

113
Glossary
Integrity—A monitoring and management system that performs integrity checks
and protects systems from unauthorized modifications to data, systems, and
applications files. Normally, performing such checks requires access to a prior scan
or original versions of the various files involved.
Internet—The global set of networks interconnected using TCP/IP.
Internet Key Exchange—A method used in the IPsec protocol suite for public key
exchange, security association parameter negotiation, identification, and
authentication.
Intranet—A portion of the information technology infrastructure that belongs to
and is controlled by the company in question.
Intrusion Detection System (IDS)—A sophisticated software or hardware network
protection system designed to detect attacks in progress, but not prevent potential
attacks from occurring.
IP—Abbreviation for Internet protocol. A protocol that moves packets of data from
node to node. Works above layer 3 (network) of the OSI reference model.
IP address—The standard way to identify a computer connected to the Internet.
Each IP address consists of 8 octets expressed as 4 numbers between 0 and 255
separated by periods. For example: 129.86.8.1.
IP Security (IPsec)—Used for encryption of TCP/IP traffic, IP Security provides
security extensions to the version of TCP/IP known as Ipv4. IPsec defines
mechanisms to negotiate encryption between pairs of hosts that want to
communicate with one another at the IP layer and can therefore handle all
host-to-host traffic between pairs of machines. In a UAC network, access to
protected resources behind an Infranet Enforcer can be configured to use IPsec to
encrypt data. For details about using IPsec in a UAC network, refer to the UAC
Administration Guide.
ISDN—Abbreviation for Integrated Services Digital Network. A network that
supports transmission of voice, data, and imaged based communications in an
integrated form.
ISP—Internet Service Provider.
IT—Information technology.
K
Kerberos—A trusted third party authentication protocol developed at MIT. Takes its
name from the 3-headed beast that guards the gates of hell in Greek mythology.
Currently a default security setting for Microsoft.
Key—A sequence of symbols that when used with a cryptographic algorithm
enables encryption and decryption. The security of the cryptographic systems is
dependent on the security of the key itself.
Key exchange—A technique in which a pair of keys is generated and then
exchanged between 2 systems (typically and client and server) over a network
connection to allow a secure connection to be established between them.