Balanced Magnetic Switch (BMS)
Balanced Magnetic Switch (BMS): A security device used to monitor the opening and closing of doors and windows. It consists of a magnet and a sensor that form a circuit, which, when disturbed (for example, by a door opening), triggers an alert. BMS systems are commonly integrated into broader security systems to detect unauthorized entries.
Authentication Header (AH)
Authentication Header (AH): A protocol used in internet security to authenticate the sender of a message and ensure data integrity. It is part of the Internet Protocol Security (IPSec) suite, providing packet-level authentication for secure communications over IP networks. However, AH does not encrypt the data.
Bandwidth
Bandwidth: The maximum rate of data transfer across a given path or network connection, typically measured in bits per second (bps). The term is used to denote the capacity of a connection to handle data traffic, affecting the speed and quality of data transfer. High bandwidth is particularly important for the transmission of large volumes […]
Authentication Server (AS) (in Kerberos)
Authentication Server (AS) (in Kerberos): In the Kerberos network authentication protocol, the Authentication Server is a key component that provides the initial verification of a principal’s (user or service) credentials. When a principal attempts to authenticate, it communicates with the AS, which checks the provided information against a database of users. If the credentials are […]
Banner Grabbing
Banner Grabbing: A technique used to gather information about computer systems on a network by sending requests and analyzing the responses (the banners) that contain details about the services running on the system. It is often an initial step in network reconnaissance for both legitimate purposes, such as network inventory, and malicious intents, like vulnerability […]
Authentication system
Authentication system: A process or methodology implemented to verify the legitimacy of a user, system, or device seeking access to a secured environment. Such systems commonly involve credentials like usernames and passwords but can also use more advanced methods, such as biometric identification, smart cards, or digital certificates, in order to uphold the integrity of […]