Symantec 10521146 - Network Security 7120 Administration Manual page 340

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

340 Glossary
asymmetric encryption A type of encryption that is based on the concept of a key pair. Also called public key
asynchronous
transmission
attack signature
attribute
authenticated,
self-signed SSL
authentication
authentication token
authorization
back door
bandwidth
baseline risk
benefit
bezel
blocking
cryptography. Each half of the pair (one key) can encrypt information so that only the
other half (the other key) can decrypt it. One part of the key pair, the private key, is known
only by the designated owner; the other part, the public key, is published widely but is still
associated with the owner. See also
A form of data transmission in which information is sent intermittently. The sending
device transmits a start bit and stop bit to indicate the beginning and end of a piece of
data.
The features of network traffic, either in the heading of a packet or in the pattern of a
group of packets, that distinguish attacks from legitimate traffic.
A property of an object, such as a file or display device.
A type of Secure Sockets Layer (SSL) that provides authentication and data encryption
through a self-signed certificate.
The process of determining the identity of a user attempting to access a network.
Authentication occurs through challenge/response, time-based code sequences, or other
techniques. Authentication typically involves the use of a password, certificate, PIN, or
other information that can be used to validate identity over a computer network. See also
PAP (Password Authentication
A portable device used for authenticating a user. Authentication tokens operate by
challenge/response, time-based code sequences, or other techniques. This may include
paper-based lists of one-time passwords. See also iButton.
The process of determining the type of activities or access that is permitted on a network.
Usually used in the context of authentication: once you have authenticated a user, the user
can be authorized to have access to a specific service.
An entry point to a program or a system that is hidden or disguised, often created by the
software's author for maintenance. A certain sequence of control characters permits
access to the system manager account. If the back door becomes known, unauthorized
users (or malicious software) can gain entry and cause damage.
The amount of data transmitted or received per unit time. In digital systems, bandwidth is
proportional to the data speed in bits per second (bps). Thus, a modem that works at
57,600 bps has twice the bandwidth of a modem that works at 28,800 bps.
The risk that exists before safeguards are considered.
The effectiveness of a safeguard in terms of vulnerability measure. If the safeguard is
applied by itself, it lowers the danger that the vulnerability poses by the amount specified.
The front panel of a Symantec Network Security 7100 Series appliance.
A configured mode for preventing malicious or unwanted network traffic from passing a
certain point in the network.
synchronous
transmission.
Protocol).

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents