Symantec 10521146 - Network Security 7120 Administration Manual page 358

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

358 Glossary
role-based
administration
ROM (read-only
memory)
router
rule
run
S/MIME
(Secure/Multipurpose
Internet Mail
Extensions)
safeguard
script
script kiddie
secure browser
security
sensor process
serial port
server
A method of administration in which access rights or permissions are granted to user
roles in hierarchical responsibilities. The set of permissions define the administrative or
user positions.
The memory that is stored on the hard drive of the computer. Its contents cannot be
accessed or modified by the computer user, but can only be read.
A device that helps local area networks (LANs) and wide area networks (WANs) achieve
interoperability and connectivity.
A logical statement that lets you respond to an event based on predetermined criteria.
To execute a program or script.
An email security protocol that was designed to prevent the interception and forgery of
email by using encryption and digital signatures. S/MIME builds security on top of the
MIME protocol and is based on technology originally developed by RSA Data Security, Inc.
The control or countermeasure employed to reduce the risk associated with a specific
threat or group of threats. Examples of safeguards are patches, policies, deterrence
measures, surveillance, physical security, upgrades, education, and training.
A type of program that consists of a set of instructions for an application. A script usually
consists of instructions that are expressed using the application's rules and syntax,
combined with simple control structures.
An unskilled cracker who uses code and software (or scripts) downloaded from the
Internet to inflict damage on targeted sites. Often these destructive activities are carried
out for no other purpose than to prove the script kiddie's hacking prowess.
A Web browser that can use a secure protocol, such as SSL, to establish a secure
connection to a Web server.
The policies, practices, and procedures that are applied to information systems to ensure
that the data and information that is held within or communicated along those systems is
not vulnerable to inappropriate or unauthorized use, access, or modification and that the
networks that are used to store, process, or transmit information are kept operational and
secure against unauthorized access. As the Internet becomes a more fundamental part of
doing business, computer and information security are assuming more importance in
corporate planning and policy.
The functionality of Network Security sensors to perform detection, analysis and take
responsive action against perceived attacks.
A location for sending and receiving serial data transmissions. Also known as a
communications port or COM port. DOS references these ports by the names COM1,
COM2, COM3, and COM4.
A computer or software that provides services to other computers (known as clients) that
request specific services. Common examples are Web servers and mail servers.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents