Symantec 10521146 - Network Security 7120 Administration Manual page 361

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

SuperUser
Symantec Network
Security Smart Agents
symmetric encryption
SYN flood
synchronize
synchronous
transmission
syntax error
syslog
system
TCP/IP (Transmission
Control
Protocol/Internet
Protocol)
An individual with an account that is configured to perform all tasks. During installation
of the master node, an account is created for a SuperUser with full permissions. This
group and the respective set of permissions is predefined, and cannot be modified.
Formerly called MSAs, the Symantec Network Security Smart Agents are a translation
software that enable Symantec Network Security to receive event data from external
sensors and correlate that data with all other events.
An encryption method involving a single secret key for both encryption and decryption.
The sender of the encrypted message must give that key to the recipient before the
recipient can decrypt it. Although this method of encryption is efficient, there is a danger
that if the secret key is intercepted, the message can be read by an unintended audience.
A type of attack in which a system is bombarded with bogus TCP/IP SYN (synchronous
idle) requests. When a session is initiated between the Transmission Control Program
(TCP) client and server in a network, a very small buffer space exists to handle the
handshaking or exchange of messages that sets up the session. The session establishing
includes a SYN field that identifies the sequence in the message exchange. An attacker can
send a number of connection requests very rapidly and then fail to respond to the reply.
This leaves the first packet in the buffer so that other, legitimate connection requests can't
be accommodated. Although the packet in the buffer is dropped after a certain period of
time without a reply, the effect of many of these bogus connection requests is to make it
difficult for legitimate requests for a session to get established. In general, this problem
depends on the operating system providing correct settings or allowing the network
administrator to tune the size of the buffer and the time-out period.
To copy files between two directories on host and remote computers to make the
directories identical to one another.
A form of data transmission in which information is sent in blocks of bits separated by
equal time intervals. The sending and receiving devices must first be set to interact with
one another at precise intervals, then data is sent in a steady stream. See also
asynchronous
transmission.
An error made by an author when creating a script, for example, not enclosing a string in
quotes or specifying the wrong number of parameters.
A Unix operating system logging capability to log to a remote server.
A set of related elements that work together to accomplish a task or provide a service. For
example, a computer system includes both hardware and software.
The suite of protocols that allows different computer platforms using different operating
systems (such as Windows, MacOS, or UNIX) or different software applications to
communicate. Although TCP and IP are two distinct protocols, the term TCP/IP includes
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer
Protocol (SMTP), Post Office Protocol (POP), and many others.
Glossary
361

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents