HP CIFS Server 2.2i Administrator's Guide version A.01.11.01
Glossary
Integrity
Glossary194
I
Integrity Integrity ensures that file system
data is not modified by an intruder. An
intruder can not intercept a file system data
packet and modify it without the network
file system discovering and rejecting the
tampering.
K
Kerberos An authentication and
authorization security system developed by
MIT and the IETF working group. It is based
on secret key technology, and is generally
easier to manage than a public key
infrastructure because of its centralized
design. However, Kerberos is not as scalable
as a public key infrastructure.
P
Public Key An encryption method by which
two users exchange data securely, but in one
direction only. A user, who has a private key,
creates a corresponding public key. This
public key can be given to anyone. Anyone
who wishes to send encrypted data to the
user may encrypt the data using the public
key. Only the user who possesses the private
key can decrypt the data.
Public Key Infrastructure Method of
managing public key encryption. Although
public key technology has the advantage of
never exchanging decryption keys, it has the
disadvantage of being difficult to manage.
Some issues include distribution of public
keys with proof of the key's ownership, and
revocation of expired or terminated keys.
S
Samba An open source product that first
appeared in the mid-1990's. Samba provides
NT file and print server capability for UNIX
systems, including most of the capabilities of
Advanced Server for UNIX, with the
exception of the Primary Domain Controller
(PDC) and Backup Domain Controller (BDC)
synchronization protocols. Although Samba
is widely used, vendor support for it is not
generally available.
Secret Key Secret key, also known as
symmetric-key or shared-key, encryption is a
ciphering technique by which two users
exchange data by encrypting and decrypting
data with a shared secret key. Data is both
encrypted and decrypted with the same key.
The secret key must be exchanged securely
(such as through the “cones of silence”) since
anyone knowing the secret key can decrypt
the data.
SMB Server Message Block, the file-sharing
protocol at the heart of Windows networking.
SMB is shared by Windows NT, Windows 95,
Windows for Workgroups, and OS/2 LAN
Manager. CIFS is essentially a renaming of
this protocol.