: Technique that incorporates an extra bit into the structure of a bit string when it is created or transmitted.
Password
: Secret code entered by the user to gain access to the data files.
Ping
: An Internet maintenance tool to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Polling
: Popular technique for establishing communication sessions in WANs.
Private key
: A method of encryption in which the recipient keeps the key secret.
Public key encryption
: Technique that uses two keys: one for encoding the message and the other for decoding it.
Public key infrastructure (PKI)
: It constitutes the policies and procedures for administering this activity.
Request-response technique
: Technique in which a control message from the sender and a response from the sender are sent at periodic synchronized intervals.
Reusable password
: A network password that can be used more than one time.
Ring topology
: Topology that eliminates the central site. All nodes in this configuration are of equal status.
Rivest-Shamir-Adleman (RSA)
: It is a highly secure public key cryptography method.
Screeningrouter
: A router that examines the source and destination addresses that are attached to incoming message packets.
Triple-DES encryption
: It is an enhancement to an older encryption technique called the data encryption standard (DES).
Trojan horse
: Program that attaches to another legitimate program but does not replicate itself like a virus.
Virus
: Program that attaches itself to a legitimate program to penetrate the operating system.
Worm
: Software program that “burrows” into the computer’s memory and replicates itself into areas of idle memory.
Zombie
: The perpetrator of a Distributed Denial of Service (DDoS) attack may employ a virtual army of robot computers to launch the attack.