: Software and hardware that provide a focal point for security by channeling all network connections through a control gateway.
Hierarchical topology
: Topology where a host computer is connected to several levels of subordinate smaller computers in a master-slave relationship.
Internet relay chat (IRC): It is a source of zombies.
Interpreter
: Language translation modules of the operating system that convert one line of logic at a time.
Intranets
: Consist of small LANs and large wide area networks (WANs) that may contain thousands of individual nodes.
Intrusion prevention systems (IPS)
: A system that employ deep packet inspection (DPI) to determine when an attack is in progress.
IP broadcast address:
A message that sent to entire subsub-networknetwork of computers.
IPspoofing
It is a form of masquerading to gain unauthorized access to a Web server and/or to perpetrate an unlawful act without revealing one’s identity.
Key: A is a mathematical value that the sender selects.
Keystroke monitoring
: It involves recording both the user’s keystrokes and the system’s responses.
Line error
: A problem in data communications and data loss.
Log-on procedure
: It is the operating system’s first line of defense against unauthorized access.
Messagesequence numbering
: A sequence number that is inserted in each message, and any such attempt will become apparent at the receiving end.
Messagetransactionlog
: The log that records all incoming and outgoing messages.
Multilevel password control
: It involves sharing the same computers to specific directories, programs, and data files.
Network-level firewall
: Firewalls that provide efficient but low-security access control.
Networktopology
: Physical arrangement of the components.
One-time passwords
: A password control approach that uses the technology that employs a credit card-sized smart card containing a microprocessor programmed with an algorithm that generates, and electronically displays, a new and unique password every 60 seconds.
Operating system security
: It involves policies, procedures, and controls that determine who can access the operating system, which resources (files, programs, printers, etc.) they can use, and what actions they can take.
Operating system
: It is the computer’s control program that allows users and their applications to share and access common computer resources, such as processors, main memory, databases, and printers.