User guide
Odyssey Access Client User Guide
116
Private key—A piece of data generated by an asymmetric algorithm that’s used by
the host to encrypt data encrypted with a public key. This technique makes digital
signatures and nonrepudiation possible.
Protocol—The procedures that two or more computer systems use so they can
communicate with each other.
Proxy—A facility that indirectly provides some service for another facility.
Public branch exchange (PBX)—A telephone switch used on a company’s or
organizations premises to create a local telephone network.
Public key—A key used in public key cryptography that belongs to an individual
entity and is distributed publicly. Others can use this key to encrypt data that only
the key’s owner can decrypt.
Public Key Infrastructure (PKI)—The framework established to issue, maintain,
and revoke public key x.509 certificates.
R
RC4—Rivest cipher 4.
RC5—Rivest cipher 5.
Remediation—Remediation is the process of bringing an endpoint (computer) into
compliance with an organization’s security policies.
Remote Authentication Dial-in User Services (RADIUS)—An Internet protocol
described in RFC 2138 used for remote access services. It conveys user
authentication and configuration data between a centralized authentication server
and a remote access device to permit the remote access device to authenticate
requests to use its network access ports. Users present the remote access device
with credentials, which are in turn passed to the RADIUS server for authentication.
Remote monitoring (RMON)—An Internet protocol that extends the Simple
Network Management Protocol (SNMP) functionality to include messages about and
techniques for exchanging data between network systems and devices and a
centralized network management application.
Role—A role defines settings for your user account, such as which resources you
can access.
Router—An Internetworking switch operating at the OSI level 3 (network layer) that
connects multiple network segments and routes packets between them. Routers
also split broadcast domains.
RSA—Referring to the principles: Ron Rivest, Adi Shamir, and Len Adleman. The
RSA algorithm is used in cryptography and is based on the fact that it is easy to
multiple two large prime numbers together, but hard to factor them out of the
product.