User guide
Odyssey Access Client User Guide
114
Key Pair—A public key and its corresponding private key as used in public key
cryptography.
Key recovery—A mechanism for determining the key used to encrypt some data.
L
Layer 2 Tunneling Protocol (L2TP)—A technology used with VPN to establish a
communication tunnel between communicating parties over insecure media. L2TP
permits a single logical connection to transport multiple protocols between a pair of
hosts. L2TP is a member of the TCP/IP protocol suite and is defined in RFC 2661.
Lightweight Directory Access Protocol (LDAP)—A TCP/IP protocol that enables
client systems to access directory services and related data. LDAP is defined in
RFCs 1777 and 2559.
Local Area Network (LAN)—A network that consists of a single type of data link
and that can reside entirely within a physically protected area.
M
Man-in-the-Middle—An attack in which a hacker attempts to intercept data in a
network stream and then inserts their own data into the communications with the
goal of disrupting or taking over communications.
Mandatory Access Control (MAC)—A centralized security method that does not
allow users to change permissions on objects.
MD4—Message digest algorithm 4.
MD5—Message digest algorithm 5.
Message digest—A unique snapshot image of data that can be used for alter
comparisons. Change a single character in the message and the message will have a
different message digest. Also called a hash code.
Multifactor authentication—An authentication process that uses more than one
authentication method to establish a users identity. (RSA SecurID is a multifactor
authentication method with a pin and passcode required for authentication.)
N
Network—An organization of stations capable of intercommunications serviced by
a single switching or processing station.
Network Address Translation (NAT)—TCP/IP protocol technology that maps
internal IP addresses to one or more external IP addresses through the of a NAT
server. NAT enables conversation of public IP address space by mapping private IP
addresses used in an internal LAN to one or more external public IP addresses to
communicate with the external world. NAT also provides address-hiding services so
that NAT adds both security and simplicity to network addressing.
Network Intrusion Detection Systems—An IDS system that monitors traffic and
activity on one or more network segments.