Symantec 10521146 - Network Security 7120 Administration Manual page 347

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

FTP (File Transfer
Protocol)
gateway
gating
gigabit Ethernet
interface
granularity
greyware
group
group, monitoring
hack
hack tool
hacker
hardware setup
heuristic
high availability
hijacking
host
The simplest way to exchange files between computers on the Internet. Like the Hypertext
Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the
Simple Mail Transfer Protocol (SMTP), which transfers email, FTP is an application
protocol that uses the Internet's TCP/IP protocols.
A network point that acts as an entrance to another network. In a company network, a
proxy server acts as a gateway between the internal network and the Internet. A gateway
can also be any computer or service that passes packets from one network to another
network during their trip across the Internet.
See blocking.
NIC interfaces on the Network Security or network devices capable of up to 1000Mb/s, half
or full-duplex, of ethernet traffic.
The relative fineness or coarseness by which a mechanism can be adjusted.
Programs that do not contain viruses and that are not obviously malicious, but which can
be annoying or even harmful to the user. For example, hack tools, accessware, spyware,
adware, dialers, and joke programs.
A category of user accounts in Symantec Network Security that contains specific,
predefined permissions and rights. See also
A subset of a cluster.
A program in which a significant portion of the code was originally another program.
A tool that is used by a hacker to gain unauthorized access to a computer. One type of hack
tool is a keystroke logger, which is a program that tracks and records individual keystrokes
and can send this information back to the hacker.
A term used by some to mean a clever programmer and by others, especially journalists or
their editors, to mean someone who tries to break into computer systems.
A set of hardware parameters, such as modem type, port/device, and data rate, that is used
as a singular named resource in launching a host or remote session.
A technology that uses experience-based knowledge rather than virus definitions to
identify new threats by examining files for suspicious behavior.
See
watchdog
process.
The control of a connection taken by the attacker after the user authentication has been
established.
1. In a network environment, a computer that provides data and services to other
computers. Services might include peripheral devices, such as printers, data storage,
email, or World Wide Web access. 2. In a remote control environment, a computer to which
remote users connect to access or exchange data.
user
account.
Glossary
347

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents