Symantec 10521146 - Network Security 7120 Administration Manual page 342

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

342 Glossary
checksum
Checksums
CLI (Command Line
Interface)
cluster
COM (communications)
port
communications
protocol
compact flash (CF)
Network Security
console
content scanning or
screening
content virus
control
copy port
correlation
CSP (Client Server
Protocol)
current risk
current vulnerability
measure
A count of the number of bits in a transmission unit that is included with the unit so that
the receiver can check to see whether the same number of bits arrived. If the counts
match, it is assumed that the complete transmission was received. Also called hash.
A checksum is a value that is generated to verify the integrity of data, and stored or
transmitted with the data that it verifies. To verify the data, the receiver generates a
second checksum and compares the two checksums. If the values match, this confirms
that the data has not been altered or contaminated.
(Command Line Interface) A utility that provides an alternate way to execute commands in
UNIX and Windows NT environments.
A group of two or more nodes that are linked together to share attack data and/or to
provide continued operation in the event that one server fails. A cluster can include up to
125 Network Security software nodes across multiple network segments within multiple
network locations.
A location for sending and receiving serial data transmissions. Also called a serial port.
These ports are referred to as COM1, COM2, COM3, and COM4.
A set of rules that are designed to let computers exchange data. A communications
protocol defines issues such as transmission rate, interval type, and mode.
Digital memory technology providing non-volatile data storage on a compact flash card,
readable and writable by a compact flash adaptor on a computer.
The graphical user interface (GUI) that is provided for centralized administration of
software and appliance nodes and node clusters in Symantec Network Security.
The ability to review the actual information that an end user sees when using a specific
Internet application, for example, the content of email messages.
A virus that is commonly protected against with a virus scanner. See also
attack.
A safeguard that mitigates a vulnerability or exposure and reduces risk. Examples are
strong user passwords, applying vendor patches, and removing unneeded services.
See
interface,
monitoring.
The intelligent association of disparate items into a related group.
A protocol that packages and sends data from component to component using the various
transports that ESM supports. CSP bundles the data and places it on the network in
whatever way is appropriate for the transport mechanism.
The risk that remains after safeguards have been applied.
The danger that is posed by a vulnerability after you have accounted for the safeguards
that you use to secure it. If you use a valid safeguard, the current vulnerability measure is
less than the default vulnerability measure.
data-driven

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents