Symantec 10521146 - Network Security 7120 Administration Manual page 346

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

346 Glossary
failover
false negative
false positive
fault tolerance
FDDI (Fiber Distributed
Data Interface)
file transfer
filter
firewall
firewall denial of
service
firewall
hardware/software
flooding program
flowcookie
follow-up
FQDN (fully qualified
domain name)
An automated strategy to provide high availability and redundancy by deploying a
standby node to take over if the master node fails or is shut down for servicing. See also
watchdog
process.
An unrecognized and/or unreported activity or state that requires response, such as a
virus or intrusion that is not detected.
A reported activity or state that does not require response because it was reported
incorrectly or does not pose a threat. Too many false positives can become intrusive in
themselves.
A design method that ensures continued systems operation in the event of individual
failures by providing redundant system elements.
A set of ANSI protocols used for sending digital data over fiber optic cable. FDDI networks
are token-passing networks and support data rates of up to 100 Mb (100 million bits) per
second. FDDI networks are typically used as backbones for wide area networks.
The process of using communications to send a file from one computer to another. In
communications, a protocol must be agreed upon by sending and receiving computers
before a file transfer can occur.
A program or section of code that is designed to examine each input or output request for
certain qualifying criteria and then process or forward it accordingly. Also a method of
querying a list to produce a subset of items with specified characteristics.
A program that protects the resources of one network from users from other networks.
Often, an enterprise with an intranet that allows its workers access to the wider Internet
will install a firewall to prevent outsiders from accessing its own private data resources.
A denial of service attack aimed directly at the firewall.
A physical or virtual boundary to secure a network or network segment. A firewall can
identify and permit or block network traffic based on multiple criteria including
originating domain, network port number, and originating network IP address.
A program that contains code that, when executed, will bombard the selected system with
requests in an effort to slow down or shut down the system.
A message in string format that includes details about a particular event, such as IP
addresses, attack details, ports, etc.
The final phase of incident response to an incident. All other phases seek the most
efficient path to this phase. Reporting is a key action in this phase.
A URL that consists of a host and domain name, including top-level domain. For example,
www.symantec.com is a fully qualified domain name. www is the host, symantec is the
second-level domain, and .com is the top-level domain.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents