Network validating identity certificate
This glossary contains a list of terms, abbreviations, and acronyms frequently used when discussing networks, security, firewalls, and Watch Guard products.
# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | X | All An Ethernet specification that can handle up to 10 mega bits of data per second.
In general, FTP user agents use active mode and Web user agents use passive mode.
An intrusion technique in which a hacker sequentially scans IP addresses, generally as the information-gathering prelude to an attack.
These probes are usually attempts to map IP address space as the hacker looks for security holes that might be exploited to compromise system security.
A computer program that reports information to another computer or allows another computer access to the local system. Many security programs have agent components that report security information back to a central reporting platform.
However, agents can also be remotely controlled programs hackers use to access machines.A shortcut that enables a user to identify a group of hosts, networks, or users under one name.Aliases are used to speed user authentication and service configuration.For example, in configuring a Firebox a user can set up the alias "Marketing" to include the IP addresses of every network user in a company's marketing department.