Installation guide
43
Network gateway - An inter-networking system that joins two networks together. A network gateway can
be implemented completely in software, completely in hardware, or as a combination of the two.
Network interface – A boundary across which two independent systems meet and communicate with each
other.
Packet - A bundle of data organized for transmission, containing control information (destination, length,
origin, etc.) the data itself and error detection and correction bits.
Patches - Upgrades for software supplied by manufacturers such as Microsoft usually over the Internet.
Port – In a communications network, a port is a point at which signals can enter or leave the network en
route to or from another network.
Protocol - A formal description of message formats and the rules two computers must follow to exchange
those messages.
Router - An electronic device that connects two or more networks and routes incoming data packets to the
appropriate network.
Rulebase – Component of logic system that specifies the meanings of the well-formed expressions of the
logical language.
Ruleset - A rule set contains an ordered group of configured rules which are sequentially tested or applied.
Security – Techniques for ensuring that any data stored on a PC can not be read or compromised by
individuals who don’t have authorisation. Most PC security includes passwords and data encryption.
SMPT - Simple Mail Transfer Protocol is the protocol used to transfer e-mail.
Software - A program or set of instructions that controls the operation of a computer. Distinguished from
the actual hardware of the computer.
Spam mail - The Internet version of junk mail. Spamming is sending the same message to a large number
of mailing lists or newsgroups usually to advertise something.
Spyware - Any software that covertly gathers user information through the user's Internet connection
without his or her knowledge, usually for advertising purposes.
Stateful Inspection – Also know as dynamic packet filtering, stateful inspection is a firewall architecture
that provides enhanced security by keeping track of and examining both incoming and outgoing packets.
TCP/IP – Transmission Control Protocol/Internet Protocol.
Trojan Horse - a sort of virus although it does not replicate itself - it is something which is hidden in a file
and, when activated, it does terrible damage ... like a Friday 13th thingy - obviously named after the Trojan
Horse.
Virus - In computer security technology, a virus is a self-replicating program that spreads by inserting
copies of itself into other executable code or documents.
VOIP – Voice Over Internet Protocol. Using the internet protocol to carry voice data. Depending on the
scenario, VOIP can facilitate cheap or even free phone calls.
VPN – Virtual Private Network. A private data network that makes use of the public telecommunications
infrastructure, maintaining privacy through the use of a tunnelling protocol and security procedures.
VPN IPSEC - Internet Protocol Security is an internationally recognised VPN protocol suite developed by
the IETF (Internet Engineering Task Force).
Worm - A computer worm is a self-replicating computer program, similar to a computer virus. A virus
attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and
does not need to be part of another program to propagate itself