CRADLEPOINT MBR1400 | USER MANUAL – Firmware version 5.0
© 2013 CRADLEPOINT, INC. PLEASE VISIT HTTP://KNOWLEDGEBASE.CRADLEPOINT.COM/ FOR MORE HELP AND RESOURCES PAGE 259
Network Layer
The third layer of the OSI model which handles the routing
of traffic on a network.
Network Time Protocol
Used to synchronize the time of all the computers in a
network.
NIC
Network Interface Card.
NTP
Network Time Protocol.
OFDM
Orthogonal Frequency-Division Multiplexing. The
modulation technique for both 802.11a and 802.11g.
OSI
Open Systems Interconnection. The reference model for
how data should travel between two devices on a network.
OSPF
Open Shortest Path First. A routing protocol that is used
more than RIP in larger scale networks because only
changes to the routing table are sent to all the other routers
in the network as opposed to sending the entire routing
table at a regular interval, which is how RIP functions.
Password
A sequence of characters that is used to authenticate
requests to resources on a network.
Patch
A patch is an update to a vulnerable program or system. A
common practice to keep your computer and mobile
devices secure is installing the vendor’s latest patches in
a timely fashion. Some vendors release patches on a
monthly or quarterly basis. Therefore, having a computer
that is unpatched for even a few weeks could leave it
vulnerable.
Personal Area Network
The interconnection of networking devices within a range
of 10 meters.
Phishing
Phishing is a social engineering technique where cyber
attackers attempt to fool you into taking an action in
response to an email. Phishing was a term originally used
to describe a specific attack scenario. Attackers would
send out emails pretending to be a trusted bank or
financial institution; their goal was to fool victims into
clicking on a link in the email. Once clicked, victims were
taken to a website that pretended to be the bank, but was
really created and controlled by the attacker. If the victim
attempted to log in thinking they were at their bank, their
login and password would then be stolen by the attacker.
The term has evolved and often means not just attacks
designed to steal your password, but emails designed to
send you to websites that hack into your browser, or even
emails with infected attachments.