Symantec 460R - Gateway Security Administrator's Manual page 175

Administration guide
Hide thumbs Also See for 460R - Gateway Security:
Table of Contents

Advertisement

rule
A logical statement that lets you respond to an event based on predetermined criteria.
run
To execute a program or script.
secondary server
A computer that is running Symantec AntiVirus Corporate Edition Server software that is a child of a primary server.
In a server group, all secondary servers retrieve information from the same primary server. If the secondary server is
a parent server, it in turn passes information on to its managed clients.
secure browser
A Web browser that can use a secure protocol, such as SSL, to establish a secure connection to a Web server. Netscape
Navigator and Internet Explorer both offer this feature.
security
The policies, practices, and procedures that are applied to information systems to ensure that the data and
information that is held within or communicated along those systems is not vulnerable to inappropriate or
unauthorized use, access, or modification and that the networks that are used to store, process, or transmit
information are kept operational and secure against unauthorized access. As the Internet becomes a more
fundamental part of doing business, computer and information security are assuming more importance in corporate
planning and policy.
security architecture
A plan and set of principles that describe the security services that a system is required to provide to meet the needs
of its users, the system elements required to implement the services, and the performance levels required in the
elements to deal with the threat environment.
security domain
A grouping of systems for security purposes. A security domain can be based on many system attributes, such as
operating system, location, function, and role.
security gateway
A network entity that defines the gateway that serves as the point of decryption and encryption for the network.
security lifecycle
The cycle of threat awareness, policy definition, policy implementation, and policy monitoring.
security policy
1. A company's formal declaration of its security goals and how it will meet those goals. At its most fundamental
level, a security policy is an organization of controls that is designed to reduce risk, demonstrate fiduciary
responsibility, and satisfy regulatory code. 2. A set of security modules, such as the rules for constructing passwords
or the ownership of a system's start-up procedures. Policies establish which users can access certain information,
and point to the standards and guidelines that describe the necessary security checks.
security response
The process of research, creation, delivery, and notification of responses to viral and malicious code threats and
operating system, application, and network infrastructure vulnerabilities. See also notification.
security risk
A known program that may or may not be a threat to a computer. For example, an email greeting that acts like a mass
mailer, but isn't strictly a worm because you can choose to use it before it activates.
serial communication
The transmission of information between computers or between computers and peripheral devices one bit at a time
over a single line (or a data path that is 1 bit wide). Serial communications can be either synchronous or
asynchronous. The sender and receiver must use the same data transfer rate, parity, and flow control information.
Most modems automatically synchronize to the highest data transfer rate that both modems can support.
pcAnywhere uses the asynchronous communications standard for personal computer serial communications.
serial interface
A data transmission scheme in which data and control bits are sent in a 1-bit wide data path sequentially over a
single transmission line. See also RS-232-C standard.
serial port
A location for sending and receiving serial data transmissions. Also known as a communications port or COM port.
DOS references these ports by the names COM1, COM2, COM3, and COM4.
serial transmission
The transmission of discrete signals one after the other. In communications and data transfer, serial transmission
involves sending information over a single wire one bit at a time. This is the method used in modem-to-modem
communications over telephone lines.
server
Hardware or software that provides services to other computers (known as clients) that request specific services.
Common examples are Web servers and mail servers.
service level agreement
An agreement between the party providing incident response and the party being protected. Service level
agreements include time allotments for the contain, eradicate, recover, and follow-up phases of incident response.
services
Refers to different types of network resources like Web, FTP and SMTP. Services are defined by their port number
and protocol type (TCP, UDP, ICMP). For example, the Web (HTTP) service uses the TCP protocol over port 80.
Glossary
175

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 460R - Gateway Security and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents