User Manual

About This Document
Technical Terms and Abbreviations
10 | 85
A6V11646120_enUS_b_40
RSA
RSA (RivestShamirAdleman) is one of the first public-key cryptosystems
and is widely used for secure data transmission. In such a cryptosystem, the
encryption key is public, and it is different from the decryption key which is kept
secret (private). In RSA, this asymmetry is based on the practical difficulty of
the factorization of the product of two large prime numbers, the factoring
problem.
Samba
Samba is a Linux application to provide shared access to files for Windows
platform computers.
SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions
designed by the United States National Security Agency (NSA) They are built
using a one-way compression function built from a (classified) specialized
block cipher. Cryptographic hash functions are mathematical operations run on
digital data; by comparing the computed hash (the output from execution of the
algorithm) to a known and expected hash value, a person can determine the
data's integrity.
SI
Smart Infrastructure Siemens Division.
SMB
Server Message Block is an application layer network protocol, mainly used for
providing shared access to files.
SMC
The System Management Console is a standalone tool that initializes a new
project, restores a project, and configures system-wide settings such as history
database, system users and web server parameters.
System Management Console provides the user interface to configure and
administer the system and host field system drivers. The server hosts the
project to monitor and control the facility including runtime data. Projects are
managed by the System Management Console.
SQL
Structured Query Language is a domain-specific language used in
programming and designed for managing data held in a relational database
management system (RDBMS), or for stream processing in a relational data
stream management system (RDSMS).
SSH
Secure Shell is a cryptographic network protocol for operating network
services securely over an unsecured network.
SSL
Secure Sockets layer is a cryptographic protocol that provides communication
security over a computer network.
https://www.tutorialsteacher.com/https/how-ssl-works
TLS
Transport Layer Security is a cryptographic protocol designed to provide
communications security over a computer network. Several versions of the
protocols find wide-spread use in applications such as web browsing, email,
instant messaging, and voice over IP (VoIP). Websites can use TLS to secure
all communications between their servers and web browsers.
TRCA
Is Windows Trusted Root Certificates Authorities
https://docs.microsoft.com/en-us/windows-hardware/drivers/install/trusted-root-
certification-authorities-certificate-store
UAC
User Account Control is a technology and security infrastructure that aims to
improve the security of Microsoft Windows by limiting application software to
standard user privileges until an administrator authorizes an increase or
elevation. In this way, only applications trusted by the user may receive
administrative privileges, and malware should be kept from compromising the
operating system.
VAP
Value added partner - Solution Partner.
VLAN
Virtual Local Access Network. Any broadcast domain that is partitioned and
isolated in a computer network.