L
L2F

See Layer 2 Forwarding (L2F).

L2TP

See Layer 2 Tunneling Protocol (L2TP).

LAN

See local area network (LAN).

LANMAN

An old authentication method used with early Windows-based systems.

latency

The wait time between the call for an action or activity and the actual execution of that action.

lattice

The concept that access differs at different levels. Often used in discussion with the Biba and Bell La-Padula models as well as with cryptography to differentiate between security levels based upon user/group labels.

Layer 2 Forwarding (L2F)

A tunneling protocol often used with virtual private networks (VPNs). L2F was developed by Cisco.

Layer 2 Tunneling Protocol (L2TP)

A tunneling protocol that adds functionality to Point-to-Point Protocol (PPP). This protocol was created by Microsoft and Cisco and is often used with virtual private networks (VPNs).

LCP

See Link Control Protocol (LCP).

LDAP

See Lightweight Directory Access Protocol (LDAP).

Lightweight Directory Access Protocol (LDAP)

A set of protocols that was derived from X.500 and operates at port 389.

limited distribution

Describes information that isn't intended for release to the public. This category of information isn't secret, but it's private.

Link Control Protocol (LCP)

The protocol used to establish, configure, and test the link between a client and PPP host. See also Point-to-Point Protocol (PPP).

local area network (LAN)

A network that is restricted to a single building, group of buildings, or even a single room. A LAN can have one or more servers.

local registration authority (LRA)

An authority used to identify or establish the identity of an individual for certificate issuance.

logic bomb

Any code that is hidden within an application and causes something unexpected to happen based on some criteria being met. For example, a programmer could create a program that always makes sure his name appears on the payroll roster; if it doesn't, then key files begin to be erased.

logs and inventories

Tools used to help an organization know what is happening to its systems and assets. System logs tell what is happening with the systems in the network. Inventories refer to both the physical assets and the software assets a company owns.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.201.71