Security Knowledge Base

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

“Webinar

 
Labels

Knowledge Base Articles

What is Encryption? Types: RFCs: See Also:  What is Encryption?Encryption is a mechanism that protects your valuable information, such as your documents, pictures, or online transactions, from unwanted people accessing or changing it. Encryption work...

ITA Terms by Community Member
  • 4903 Views
  • 0 comments
  • 0 Helpful votes

DescriptionDynamic Multipoint VPN (DMVPN)Complete DefinitionDynamic Multipoint VPN enables zero-touch deployment of IPsec encrypted VPN networks. DMVPN Spoke-to-Spoke Functionality is an enhancement that enables the secure exchange of data between tw...

ITA Terms by Community Member
  • 304 Views
  • 0 comments
  • 0 Helpful votes

NAC

IntroductionNetwork Admission Control.                                                                                                              orNetwork Access Control (NAC) solutions deliver a comprehensive approach to identifying, controlling,...

ITA Terms by Community Member
  • 3313 Views
  • 0 comments
  • 0 Helpful votes

TLS

Introduction:Transport Layer Security (TLS).TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences bet...

ITA Terms by Community Member
  • 12229 Views
  • 0 comments
  • 0 Helpful votes

CA

Definition1. Call Appearance (CA) telecommunication term2. Certification Authority (CA) Complete Definition1. Call Appearance (CA) telecommunication term 2. Certificate AuthorityA certificate authority (CA) is an authority in a network that issues an...

ITA Terms by Community Member
  • 2377 Views
  • 0 comments
  • 0 Helpful votes

Introduction: Complete Definition Also See:   Introduction:This document tells you about basics of TACACS+ Complete Definition Terminal Access Controller Access Control System Plus (TACACS+). An extended set of TACACS commands. This is a security app...

ITA Terms by Community Member
  • 5480 Views
  • 0 comments
  • 0 Helpful votes

Description:Terminal Access Controller Access Control System (TACACS)Terminal Access Controller Access-Control System (TACACS) is a remote authentication protocol that is used to communicatewith an authentication server commonly used in UNIX networks...

ITA Terms by Community Member
  • 5047 Views
  • 0 comments
  • 0 Helpful votes

Introduction In Depth RFC: Also See:  IntroductionTriple DES (3DES)The Data Encryption Standard (DES) was developed by an IBM team around 1974 and adopted as a national standard in 1977. Triple DES is a minor variation of this standard. It is three t...

ITA Terms by Community Member
  • 13245 Views
  • 0 comments
  • 0 Helpful votes

DescriptionAuthorization is the concept of allowing access to resources only to those permitted to use themBasic concept: "based off who you are - what are you allowed to do"Once upon a time, AAA command authorization in Cisco IOS queried the TACACS+...

ITA Terms by Community Member
  • 3048 Views
  • 0 comments
  • 0 Helpful votes

AES

Introduction Terminology Features Implementations RFCs: Also See:  IntroductionThe Advanced Encryption Standard (AES) computer security standard is a symmetric block cipher that encrypts and decrypts 128-bit blocks of data. Standard key lengths of 12...

ITA Terms by Community Member
  • 9402 Views
  • 0 comments
  • 1 Helpful votes

MD5

Description Features of MD5 RFCs Also See  DescriptionMessage Digest algorithm 5 (MD5) Features of MD5 MD5 (Message-Digest Algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value.MD5 has been employed in a wide variety of ...

ITA Terms by Community Member
  • 3220 Views
  • 0 comments
  • 0 Helpful votes

Description Complete Definition RFCs: Also See:  DescriptionInternet Security Association and Key Management Protocol (ISAKMP) Complete DefinitionInternet Security Association and Key Management Protocol (ISAKMP), a key protocol in the IPsec (Interne...

ITA Terms by Community Member
  • 18265 Views
  • 0 comments
  • 0 Helpful votes

Introduction: Deep Dive: How IPSec works? RFCs: Also See:  Introduction:IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Deep Dive: Earlier secur...

ITA Terms by Community Member
  • 9034 Views
  • 0 comments
  • 0 Helpful votes

Description:OAKLEY protocolComplete Definition:Key establishment is the heart of data protection that relies on cryptography, and it is an essential component of the packet protection mechanisms described in [RFC2401], for example.  A scalable and se...

ITA Terms by Community Member
  • 2793 Views
  • 0 comments
  • 0 Helpful votes
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Top Contributors
Featured Article