User guide

117
Glossary
S
Secure channel—A means of conveying information from one entity to another
such that an adversary does not have the ability to reorder, delete, insert, or read.
(Examples are SSL and IPSEC.)
Secure Hypertext Transfer Protocol (HTTPS)—An Internet protocol that encrypts
individual messages used for Web communications rather than establishing a
secure channel, like in SSL.
Secure Multipurpose Internet Mail Extensions (S/MIME)—An Internet protocol
governed by RFC 2633 and used to secure email communications through
encryption and digital signatures for authentication.
Secure Shell (SSH)—A protocol designed to support secure remote login, along with
secure access to other services across an insecure network. SSH includes a secure
transport layer protocol that provides server authentication, confidentiality, and
integrity, along with a user authentication protocol and a connection protocol that
runs on top of the user authentication protocol.
Secure Sockets Layer (SSL)—An Internet protocol originally created by Netscape
Corp. that uses connection oriented, end-to-end encryption to ensure that
client/server communications are confidential and meet integrity constraints. SSL
operates between the HTTP application layer protocol and reliable transport layer
protocol. (usually TCP)
SHA, SHA-1—Secure Hash Algorithm. SHA-1 being considered more secure.
Simple Network Management Protocol (SNMP)—A UDP based application layer
Internet protocol used for network management, SNMPO is governed by RFC 2570
and 2574.
Single sign on (SSO)—The concept or process of using a single logon authority to
grant users access to resources on a network regardless of what operating system or
application is used to make or handle a request for access. The concept behind the
term is that users need to authenticate only once but can then access any resources
available on a network.
Smart card—A credit card sized device that contains an embedded chip. On this
chip, varying and multiple types of data can be stored, such as a driver’s license
number, medical information, passwords or other authentication data, and even
bank account data.
Spoofing—A technique for generating network traffic that contains a different
source address from that of the machine actually generating the traffic. It foils
identification of the true source.
Switch—A hardware device that manages multiple, simultaneous pairs of
connections between communicating systems.
Symmetric encryption—An encryption technique in which a single encryption key
is generated and used to encrypt data.