Symantec 10521146 - Network Security 7120 Administration Manual page 341

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

bps (bits per second)
Bridge
broadcast
BTO server
buffer overflow attack
bypass unit
cable
cache file
capability
CD start
certificate
Certificate
Authority-signed SSL
CGI (Common Gateway
Interface) exploit
channel
A measure of the speed at which a device such as a modem can transfer bits of data.
An application that retrieves events from non-SESA, native Symantec products and places
them in the SESA DataStore.
To simultaneously send the same message to all users on a network.
A build-to-order server is a PC or laptop running Red Hat Linux, configured as a DHCP
server, TFTP server, and NFS server. It uses the Red Hat kickstart mechanism to load a
Symantec Network Security 7100 Series appliance with initial software.
An attack that works by exploiting a known bug in one of the applications running on a
server. This then causes the application to overlay system areas, such as the system stack,
thus allowing the attacker to gain administrative rights. In most cases, this gives the
attacker complete control over the system. Also called stack overflow.
A device that provides the ability to transparently detour network traffic around a
malfunctioning Ethernet network appliance.
A group of wires that are enclosed in a protective tube. Usually this is an organized set of
wires that correspond to specific pins on a 9- or 25-pin connector located at each end. A
cable is used to connect peripheral devices to each other or to another computer. In remote
computing, this can refer to a cable that is used to connect a computer to a modem, or a
cable that connects two computers directly, that is sometimes called a null modem cable.
A file that is used to improve the performance of Microsoft Windows. The cache file is
established on the remote computer and is used to hold Windows bitmap data. If the
bitmap data is in the cache file when a Windows screen is redrawn, the data does not have
to be resent, that results in better performance.
The measure of a threat's technical expertise or knowledge of a system's connectivity.
A screen that is usually the first thing a customer will see after inserting the Symantec
product CD.
A file that is used by cryptographic systems as proof of identity. It contains a user's name
and public key.
A type of Secure Sockets Layer (SSL) that provides authentication and data encryption
through a certificate that is digitally signed by a Certificate Authority.
A denial of service attack that is aimed at the Common Gateway Interface (CGI). CGI is a
standard way for a Web server to pass a Web user's request to an application program and
to receive data back to forward to the user. It is part of the Web's Hypertext Transfer
Protocol (HTTP).
A communication medium for transferring information. Also called a line or circuit.
Depending on its type, a communications channel can carry information in analog or
digital form. A communications channel can be a physical link, such as a cable that
connects two stations in a network, or it can consist of some electromagnetic
transmission.
Glossary
341

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents