Symantec 10521146 - Network Security 7120 Administration Manual page 357

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

RAM (Random Access
Memory)
real-time
record
redundancy
remote access
replication
report
reset
reset interface
response action
response policy
response rule
RestrictedUser
rights
RIP (Routing
Information Protocol)
risk
rogue program
role
The memory that information required by currently running programs is kept in,
including the program itself. Random access refers to the fact that it can be either read
from or written to by any program. Many operating systems protect critical, occupied, or
reserved RAM locations from tampering.
An immediate action in response to an event, incident, or alert.
To capture and store a set of data that consists of a series of actions and events.
See
watchdog
process.
The use of programs that allow access over the Internet from another computer to gain
information or to attack or alter your computer.
The process of duplicating data from one database to another.
A set of data that is collected by Symantec Network Security that allows all types of data to
be selectively examined, scheduled, exported, or printed.
An action that clears any changes made since the last apply or reset action.
An interface on a Symantec Network Security 7100 Series appliance through which TCP
resets are sent to stop a malicious TCP/IP flow.
A predefined reaction to an event or alert to a defined security threat, such as capturing
the attacker's section, triggering tracking, or emailing an alert. Response actions can be
configured for each type of incident that is handled by Symantec Network Security.
A collection of response rules to react to incidents and events.
The method of action for handling security risks that is selected from alternatives, given
specific conditions to guide and determine present and future decisions. A logical
statement that lets you respond to an event based on predetermined criteria.
An individual with an account that is configured to perform a restricted set of tasks, such
as view reports, and receive alerts. This group and the respective set of permissions is
predefined, and cannot be modified.
See permissions.
The oldest routing protocol on the Internet and the most commonly used routing protocol
on local area IP networks. Routers use RIP to periodically broadcast the networks that they
know how to reach.
The anticipated adverse impact that can result if a threat exploits a vulnerability in an
asset.
Any program intended to damage programs or data (such as malicious Trojan horses).
An administrative position that is defined by a set of permissions.
Glossary
357

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents