This glossary contains terms that are used within SecurityPro that might not be familiar to you.
A | B | C | D | H | I | M | P | S | T | U |
A |
|
APN |
Access Point Name. APN is the name of the gateway used by the Carrier to set up a connection between the carrier's Network and the Internet.
An APN provides the connection between your device to a specific wireless provider’s Network. It contains a network ID and, optionally, an operator identifier.
Example of an APN with operator identifier: Example without operator identifier: |
B |
|
Byte |
A byte is the storage size (memory) used to represent a single character such as a letter, number, or symbol. If a word is 4 characters long, it requires 4 bytes of memory. |
Burst |
A burst is a specified amount of data sent or received in one transmission. The SecurityPro Burst Detection condition can be defined within a Rule. This condition allows for setting a threshold for the amount of data and the time that data is sent or received (x amount of bytes (for example, KB, MB, or GB) for y amount of time). When the threshold is exceeded for this x and y setting, an Alert is triggered. |
C |
|
Condition |
Within SecurityPro, Condition is a setting within a Rule that is used for triggering Alerts. When creating a Rule, at least one Condition is required. You can use one Condition, a combination of the eight Conditions, or all of the eight Conditions. See Creating a Rule and why a Rule is needed. |
D |
|
DNS |
Domain Name Service (also known as Domain Name System or Domain Name Server). DNS translates a domain name to an IP address.
A domain name is the alphabetical Web address. When you enter the Web address, DNS looks up that address and translates it to the IP address. For example, you might have a domain of example.com that translates to 123.1.2.3. DNS is a request and reply service, if one DNS server does not know the address, it will ask another server. |
H |
|
Host IP |
The Host IP is the IP address communicating with your device (traffic flow is being sent or received from the Host IP to your device). |
I |
|
ICMP |
Internet Control Message Protocol. ICMP is an error-reporting protocol used for exchanging status information or error messages.
ICMP request and reply messages are used by utilities such as "ping". The ping utility is used to determine whether you can communicate with another device from your device. Within SecurityPro, ICMP is one of the Rule Condition selections under Protocol Restriction. If you select ICMP, you are alerted when there is traffic flow between ICMP and another of the protocol selections. |
IMEI |
International Mobile Equipment Identity. IMEI is the 15-digit or 17-digit code that uniquely identifies your device.
The IMEI can be used by a telecommunications service to monitor your device, and, in the case of a misplaced or stolen device, stop the device from performing actions, such as initiating calls. For example: 12-012345-543210
|
IMSI |
International Mobile Subscriber Identity. IMSI is the number that uniquely identifies you (as the subscriber) on your carrier's network.
Your IMSI is stored on your SIM card. For example:
|
IP |
Internet Protocol. An IP address is the number (32-bit) that uniquely identifies a Network and the device (such as, mobile phone, computer, printer, or router) using that Network.
Each IP address consists of four numbers (8-bit fields) separated by periods, One part of the address identifies the host while the other part identifies the network on which the host resides.
Note: The example IP address is only for example purposes. It is not intended to actually identify an IP address. |
M |
|
MSISDN |
Mobile Station International Subscriber Directory Number. MSISDN is the phone number for your device.
The number does not include no dashes, spaces, or leading zeroes. USA Example: Outside USA Example:
The number is limited to a maximum of 15 digits, excluding prefixes. |
P |
|
Packet |
A packet is a small part of a larger piece of data being transmitted across a network. Larger pieces of data are broken into bytes. These pieces of data, or bytes, are called packets.
A packet contains a header and the payload:
If a packet happens to be dropped during a transmission, when the transmission is sent again, only the packet is resent. |
Platform |
A platform links an account with a company on another platform. For example, PrismPro is a platform. Devices and their information are retrieved from this platform company into SecurityPro for the linked account. If you need to know the platform linked to a device, this information is available on the Devices page in the Platform column and on the Device Details page as Source System. |
Port |
Data that is sent to an IP address is sent to a specific port. A port number is appended to an IP address (for example, "10.1.2.3:80").
In our example, "10.1.2.3" is the IP address and "80" is the Port. You can think of a port as an extension on a phone number. Ports make it possible for you to perform many actions at the same time on the same network. When set in SecurityPro, the Port Restriction Rule condition alerts you when traffic flow occurs between your device and any port that you have blocked. |
Protocol |
A protocol is the standard that defines the way devices transmit packets of data to each other across a network.
Each protocol defines specifics such as how devices identify and make connections to each other, how data is formatted when sent and what to do with that data once it is received, how the data is checked for errors, or how it is compressed. Within SecurityPro, the Protocol Restriction Rule condition provides the ability to be alerted when traffic flow occurs between your device and any protocol other than the protocol you specify (for example: TCP, UDP, ICMP). |
S |
|
Server |
A server is a computer that accepts and processes requests from another computer and responds to that computer with data based on those requests. |
SIM |
Subscriber Identity Module. SIM cards store information such as your mobile phone number, the phone company you use, and billing information.
It stores data in the case that an issue occurred with your device and you needed to use another one. You can remove the SIM and put it into another device to use that device. One other important piece of information stored on a SIM card is the IMSI number (see IMSI). Example of a SIM: Issue identification number (IIN) - first 7 digits:
Individual account number - next set of digits:
Last digit is the checksum digit:
|
Source System |
See Platform. |
T |
|
TCP |
Transmission Control Protocol. TCP is used for communicating over the internet and local networks. It allows a single device to exchange data (by way of packets) with another single device to an IP address.
TCP ensures that a packet is sent, if at all possible. If the packet does not arrive, TCP resends it and continues to resend it until it is delivered or an unrecoverable error occurs. Within SecurityPro, TCP is one of the Rule Condition selections under Protocol Restriction. If you select TCP, you are alerted when there is traffic flow between TCP and another of the protocol selections. |
TOP Talker |
Within SecurityPro, a TOP Talker is a device that is sending/receiving traffic the most out of all your devices. TOP Talkers are listed on the Dashboard. |
TOP Offender |
Within SecurityPro, a TOP Offender is a device that is causing the most violations (triggering alerts) out of all your devices. Top Offenders are listed on the Dashboard. |
U |
|
UDP |
User Datagram Protocol. UDP works similar to TCP except it does not perform error checking. Without error checking, the devices communicate more quickly. UDP is used when speed is more important than error checking, for example, live video streaming. If you miss a packet, the screen might freeze or jump but then continues streaming. UDP is one of the SecurityPro Rule Condition selections under Protocol Restriction. If you select UDP, you are alerted when there is traffic flow to/from another of the protocol selections. |
usage |
Within SecurityPro, usage relates to the flow of data packets. Rating or rounding is not used in SecurityPro usage and does not correlate to billable usage. |