Symantec 10521146 - Network Security 7120 Administration Manual page 348

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

348 Glossary
host-based security
HTML (Hypertext
Markup Language)
HTTP (Hypertext
Transfer Protocol)
HTTPS (Hypertext
Transfer Protocol
Secure)
hybrid gateway
iButton
icon
inactive
incident
incident type
initialize
in-line
insertion point
insider attack
The technique of securing an individual system from attack. Host-based security is
operating system-dependent and version-dependent.
A standard set of commands used to structure documents and format text so that it can be
used on the Web.
The set of rules for exchanging files (text, graphic images, sound, video, and other
multimedia files) on the World Wide Web. Similar to the TCP/IP suite of protocols (the
basis for information exchange on the Internet), HTTP is an application protocol.
A variation of HTTP that is enhanced by a security mechanism, which is usually Secure
Sockets Layer (SSL).
An unusual configuration with routers that maintain the complete state of the TCP/IP
connections or examine the traffic to try to detect and prevent attack (this may involve the
bastion host). If very complicated, it is difficult to attach, and difficult to maintain and
audit.
A dime-size hardware device that stores the private key portion of the Network Security
signature certificate to safeguard the private key against being stolen or compromised.
The iButton also confirms the identity of a Network Security node.
A graphic representation of a container, document, network object, or other data that
users can open or manipulate in an application.
A status that indicates that a program, job, policy, or scan is not currently running. For
example, when a scheduled scan is waiting for the specified date and time to execute, it is
inactive.
A security occurrence that requires closure. Incidents are derived from an event or a group
of events that are generated by a security point product. When a sensor detects a
suspicious event, it correlates the event to an incident containing similar or related
events. Multiple related events that indicate a possible attack are categorized as incidents.
Incidents derive their names from the highest priority event type that is correlated to the
incident.
A generic grouping that indicates key aspects of an incident based on attributes of related
vulnerabilities. Denial of service (DoS) and root compromise are examples of such
groupings.
To prepare for use. In communications, to set a modem and software parameters at the
start of a session.
A method of connecting to the network that makes the device an integral part of the
network traffic path or route.
The place where typed text or a dragged or pasted selection appears.
An attack originating from inside a protected network.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents