A method of transmitting light beams along optical fibers. A light beam, such as that produced in a laser, can be modulated to carry information. A single fiber-optic channel can carry significantly more information than most other means of information transmission. Optical fibers are thin strands of glass or other transparent material.
(1) A collection of related records. (2) A collection of information logically grouped into a single entity and referenced by a unique name, such as a filename.
File descriptors are non-negative integers that the system uses to keep track of files rather than using specific filenames. Certain file descriptors have implied uses. When a privileged program assigns an inappropriate file descriptor, it exposes that file to compromise.
The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.
Each owner’s file is encrypted under a different randomly generated symmetric file encryption key (FEK).
A virus that attaches itself to executable program files, such as word processors, spreadsheet applications, and computer games.
Software that generates, stores, and compares message digests for files to detect changes to the files.
The aggregate of all processes and procedures in a system designed to inhibit unauthorized access, contamination, or deletion of a file.
The means by which access to computer files is limited to authorized users only.
Sends and receives data between workstation and the server.
A mechanism for naming, storing, organizing, and accessing files stored on logical volumes.
A means to exchange remote files across a TCP/IP network and requires an account on the remote computer. Different versions of FTP include trivial FTP (not secure), secure FTP, and anonymous FTP using the “username” anonymous (not secure).
Used for node lookup in peer-to-peer (P2P) networks. Each node maintains a finger table with entries, indexes, and node identifiers. Each node stores the IP addresses of the other nodes.
The finite state machine (FSM) model is used for protocol modeling to demonstrate the correctness of a protocol. Mathematical techniques are used in specifying and verifying the protocol correctness. In FSM, each protocol machine of the sender or receiver is in a specific state, consisting of all the values of its variables and the program counter. From each state, there are zero or more possible transitions to other states. FSM is a mathematical model of a sequential machine that is composed of a finite set of input events, a finite set of output events, a finite set of states, a function that maps states and input to output, a function that maps states and inputs to states (a state transition function), and a specification that describes the initial state. FSMs are used for real-time application systems requiring better user interface mechanisms (menu-driven systems). In other words, FSM defines or implements the control structure of a system.
(1) A process integrated with a computer operating system that detects and prevents undesirable applications and remote users from accessing or performing operations on a secure computer; security domains are established which require authorization to enter. (2) A product that acts as a barrier to prevent unauthorized or unwanted communications between sections of a computer network. (3) A device or program that controls the flow of network traffic between networks or hosts that employ differing security postures. (4) A gateway that limits access between networks in accordance with local security policy. (5) A system designed to prevent unauthorized accesses to or from a private network. (6) Often used to prevent Internet users from accessing private networks connected to the Internet.
The component that controls a firewall’s handling of a call. The firewall control proxy can instruct the firewall to open specific ports that are needed by a call, and direct the firewall to close these ports at call termination.
A firewall environment is a collection of systems at a point on a network that together constitute a firewall implementation. The environment could consist of one device or many devices such as several firewalls, intrusion detection systems, and proxy servers.