User guide

User Guide 163
asymmetric keys
A separate but integrated user key pair, composed of one public key and one
private key. Each key is one way, meaning that a key used to encrypt
information cannot be used to decrypt the same data.
attack
An attempt to hack into a system. Because not all security issues represent true
attacks, most security vendors prefer the use of the word “event” or “incident.”
ATM (asynchronous transfer mode)
High-speed packet switching with dynamic bandwidth allocation.
authentication
A method of mapping a user name to a workstation IP address, allowing the
tracking of connections based on name rather than IP address. With
authentication, it does not matter which IP address is used or from which
machine a person chooses to work.
autopartitioning
A feature on some network devices that isolates a node within the workgroup
when the node becomes disabled, so as to not affect the entire network or
group.
authorization
To convey official access or legal power to a person or entity.
backbone
A term often used to describe the main network connections composing the
Internet.
backdoor
A cipher design fault, planned or accidental, that allows the apparent strength
of the design to be easily avoided by those who know the trick. When the design
background of a cipher is kept secret, a back door is often suspected.
bandwidth
The rate at which a network can transfer data.
Bandwidth Meter
A monitoring tool that provides a real-time graphical display of network
activities across a Firebox. Formerly known as the Mazameter.
bastion host
A computer placed outside a firewall to provide public services (such as WWW
and FTP) to other Internet sites. The term is sometimes generalized to refer to
any host critical to the defense of a local network.
bitmask
A pattern of bits for an IP address that determines how much of the IP address
identifies the host and how much identifies the network.