Professional Documents
Culture Documents
Point of Interaction (POI)
Point of Interaction (POI)
A device that provides for the entry of PINs, used for the purchase
of goods or services or dispensing of cash. An approved POI has met
all of the applicable PCI PTS POI requirements for online and/or
offline PIN entry, and has a clearly defined physical and logical
boundary for all functions related to PIN entry.
ABSecure A "virtual airlock" that isolates and protects your LAN while your
ModemSwitcher workstation or other workstations of your LAN are
connected to the Internet by modem. When a user establishes a
(ABSecure) modem connection, ABSecure's ModemSwitcher detects it
automatically and isolates the workstation from the local
network. When the user terminates the Internet connection,
ABSecure's ModemSwitcher re-enables automatically the local
connections. All the process is tranparent to the user. With
ABSecure's ModemSwitcher, an enterprise administrator can
enforce a security policy requiring that no machine on the
network is able to be connected both to the LAN and to the
Internet at the same time. Moreover, with ABSecure's
ModemSwitcher, all the modems that are not allowed throughout
the enterprise become ineffective. ABSecure's ModemSwitcher
protects your network from "bouncing" attacks. A bouncing
attack consists in hacking a workstation connected to the
Internet by dial-up, and from there to gain access to the rest of
the internal corporate network. ABSecure's ModemSwitcher
protects your LAN from this type of attack, because when a user
is connected by dial-up, he does not have access to the LAN any
more, until the modem connection is dropped.
Lucent Remote A single line dial-up port protection system that prevents
Port Security unauthorized access to a host resource. Host resource dial-up
ports, called "subscribers," are protected by the installation of
Device (Lucent the RPSD Lock hardware unit on the analog interface channel
Technologies) leading to the subscriber port. Access is provided only when the
calling party uses the RPSD Key, a hardware unit installed on the
analog interface channel on the calling party end. The RPSD
system provides security and control for virtually any type of
dial-up port on any host resource, regardless of the type of
modem associated with the host’s dial-up ports. This document
specifically targets LUCENT TECHNOLOGIES Business
Communications Systems customers and users the DEFINITY
Communication System, System 85, System 75 PBXs,
DIMENSION® PBX, and supporting peripheral products, for
which reason most references in this document are specific to
Business Communications Systems. However, this should not be
understood as restricting other applications of the RPSD system.
Port Authority Connects directly to up to eight console ports and provides the
44 highest level of protection regardless of the state of the network.
This is done by maintaining an internal security database that is
(Communcation updated by a central database on an “as needed” basis. This
Devices) internal database provides fast, reliable, two factor
authentication every time a technician accesses the router. By
using switching to connect one modem to eight routers, The Port
Authority saves line and equipment cost continually.
Port Authority Connects directly to up to eight console ports and provides the
84 highest level of protection regardless of the state of the network.
This is done by maintaining an internal security database that is
(Communcation updated by a central database on an “as needed” basis. This
Devices) internal database provides fast, reliable, two factor
authentication every time a technician accesses the router. By
using switching to connect one modem to eight routers, The Port
Authority saves line and equipment cost continually.
Private Call Allows you, the "called party", to route inbound calls to selective
Director ports, or abort them. The action is based on the Caller ID of the
inbound call. The PCD combines features of a fax server, mail
(Computer box, PBX, or a call director. It operates with any standard analog
Peripheral telephone equipment; such as voice sets, faxes, modems,
Systems) answering machines, call announcers, CPS's Modem Router
Switch, fax buffer, etc.
Smart card
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card
with embedded integrated circuits. There are two broad categories of ICCs. Memory
cards contain only non-volatile memory storage components, and perhaps dedicated
security logic. Microprocessor cards contain volatile memory and microprocessor
components. The card is made of plastic, generally polyvinyl chloride, but sometimes
acrylonitrile butadiene styrene or polycarbonate . Smart cards may also provide strong
security authentication for single sign-on within large organizations.
Overview
• Dimensions similar to those of a credit card. ID-1 of the ISO/IEC 7810 standard
defines cards as nominally 85.60 by 53.98 millimetres (3.370 × 2.125 in). Another
popular size is ID-000 which is nominally 25 by 15 millimetres (0.984 × 0.591 in)
(commonly used in SIM cards). Both are 0.76 millimetres (0.030 in) thick.
• Contains a tamper-resistant security system (for example a secure cryptoprocessor
and a secure file system) and provides security services (e.g. protects in-memory
information).
• Managed by an administration system which securely interchanges information
and configuration settings with the card, controlling card blacklisting and
application-data updates.
• Communicates with external services via card-reading devices, such as ticket
readers, ATMs, etc.
[edit] Benefits
Smart cards can provide identification, authentication, data storage and application
processing.
Contact smart cards have a contact area of approximately 1 square centimetre (0.16
sq in), comprising several gold-plated contact pads. These pad provide electrical
connectivity when inserted into a reader.[6]
Smart health cards can improve the security and privacy of patient information, provide a
secure carrier for portable medical records, reduce health care fraud, support new
processes for portable medical records, provide secure access to emergency medical
information, enable compliance with government initiatives and mandates, and provide
the platform to implement other applications as needed by the health care organization.