Siemens SINAMICS Configuration Manual page 228

Industrial security, medium-voltage converter
Hide thumbs Also See for SINAMICS:
Table of Contents

Advertisement

Glossary
Brute force
There are no efficient algorithms for solving many of the problems in computer science. The
most natural and simplest approach to an algorithmic solution for a problem is to simply try out
all possible solutions until the correct one is found. This method is called brute-force searching.
One typical application is given again and again when it comes to listing an example of brute-
force searching - the "cracking" of passwords. Passwords are often encrypted using
cryptographic hash functions. Directly calculating the password from the hash value is
practically impossible. However, a password cracker can calculate the hash values of
numerous passwords. If a value matches the value of the stored password, then the password
(or another, randomly matching password) has been found. In this case, brute force refers to
the simple trial and error approach of entering every possible password.
Cloud computing
Cloud computing is the storage of data in a remote data center, and can also involve the
execution of programs that are not installed on local computers, but rather in the (metaphoric)
cloud.
Confidentiality
Property which ensures that the information is not made available or disclosed to unauthorized
individuals, entities or processes.
Defense in depth
Potential cause of an undesirable incident which may result in damage to a system or
organization.
Denial of service (DoS)
Denial of service (DoS) is the non-availability of an IT-based service that is normally available.
Although there can be many reasons for such non-availability, the term "DoS" is generally used
when infrastructure systems are overloaded. This can be the result of an unintentional overload
or through a deliberate attack on a server, a computer or other components in a network.
DMZ
The demilitarized zone is an autonomous subnet that separates the local area network (LAN)
from the Internet through firewall routers (A and B). The firewall routers are configured in such
a way that they reject data packets for which there were no previous data packets. If a data
packet is sent from the Internet to the server, it is therefore rejected by firewall router A. If,
however, a hacker gains access to a server within the DMZ and sends data packets to the
LAN in an attempt to analyze or hack it, these are rejected by firewall router B.
Firewall
Device to connect networks with one another, which restricts the exchange of data between
two connected networks.
228
Configuration Manual, 08/2017, A5E36912609A
Industrial Security

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents