Symantec 10521146 - Network Security 7120 Administration Manual page 345

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

email bomb
email client
email server
enabled
encryption
end-to-end encryption
ESP (Encapsulated
Security Payload)
Ethernet
Ethernet interface
event
event management
event type
event, base
exploit
exposure
external threat
fail-open
A code that, when executed, sends many messages to the same address(es) for the purpose
of using up disk space or overloading an email or Web server.
An application from which users can create, send, and read email messages.
An application that controls the distribution and storage of email messages.
A status that indicates that a program, job, policy, or scan is available. For example, if
scheduled scans are enabled, any scheduled scan will execute when the date and time
specified for the scan is reached.
A method of scrambling or encoding data to prevent unauthorized users from reading or
tampering with the data. Only those who have access to a password or key can decrypt and
use the data. The data can include messages, files, folders, or disks.
The process of using encryption at the point of origin in a network, followed by decryption
at the destination.
A standard that provides confidentiality for IP datagrams or packets by encrypting the
payload data to be protected. Datagrams and packets are the message units that the
Internet Protocol deals with and that the Internet transports.
A local area network (LAN) protocol developed by Xerox Corporation in cooperation with
DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer
rates of 100 Mbps.
NIC interfaces on the Network Security or network devices capable of up to 100Mb/s, half
or full-duplex, of ethernet traffic.
A message that is generated by a product to indicate that something has happened.
The centralized collection, classification, and normalization of events to enable alerting
and reporting across multivendor managed security products.
A predefined event category that is used for sorting reports and configuring events and
alerts.
A significant occurrence in a system or application that Symantec Network Security
detects. Base events are the detected activities at the most elemental level.
For detailed descriptions of events, see
1. A method used to compromise the integrity, availability, or confidentiality of
information or services. 2. A program that automates a method to compromise the
integrity, availability, or confidentiality of information or services.
A vulnerability that is inherent in a legitimate service or system.
A threat that originates outside of an organization.
The ability of a network appliance to allow network traffic to continue even when the
appliance itself experiences a failure. This differs from
functionality is not continued by another device when the failure occurs.
"About the Web sites"
on page 22.
failover
in that other appliance
Glossary
345

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents