SSL Glossary

A | A1 | A2 | B | C | C1 | C2 | D | E | F G | H | I | J K L | M N O | P Q R | S | S1 | S2 | T | U Z


Anonymous Login
An access control quality, whereby secure servers allow users to access general-purpose or public services and resources without requiring a user-specific account. Because users may log in without disclosing their identities and without authentication, this can compromise the server's defenses.
Application Level Gateway
A firewall system where service is given by processes which keep total TCP connection state and sequencing. Application level firewalls provide protection, Internet security and online security by re-addressing traffic.
A collection of older digitized files. Sometimes, as on web sites or Internet bulletin boards, the files may be stored in a compressed format, reducing their size.
Confidence in a secure web server's security features and architecture. This confidence is based on sound security planning and policies. Simulation and penetration testing can determine the strength of the security features.
Asymmetric Cryptography
Asymmetric Cryptography is a method for encrypting computer files. It uses two "keys"; text encrypted with the one key can only be decrypted by the other.

One of the keys is kept private by one party. The second key is called the "public key", and it should be available to everyone who has legitimate need of access.
Attack Signature
Secure server network logs often show activities or alterations to a system signaling an attack or attempted attack. Attack signature especially indicates a particular kind of attack, which is often decided by examination of audit.
Gathering records to check their conformity with an SSL security policy.
Audit Trail
A time-sequential record of system actions that is sufficient to reconstruct, review and examine an operation or transaction from start to finish, also known as a security audit trail.
«« Back to Top

Бесплатный сертификат SSL