Symantec 10521146 - Network Security 7120 Administration Manual page 362

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

362 Glossary
Telnet
text field
thin client
threat
threat assessment
threat, blended
threshold
time-out
title bar
token
token ring
toolbar
tracking
trackware
trapdoor
The main Internet protocol for creating an interactive control connection with a remote
computer. Telnet is the most common way of allowing users a remote connection to a
network, as with telecommuters or remote workers.
The area in which a user can type text.
A low-cost computing device that works in a server-centric computing model. Thin clients
typically do not require state-of-the-art, powerful processors and large amounts of RAM
and ROM because they access applications from a central server or network. Thin clients
can operate in a server-based computing environment.
A circumstance, event, or person with the potential to cause harm to a system in the form
of destruction, disclosure, modification of data, and/or denial of service.
The identification and quantification of human threats to an organization or its systems.
An attack that uses multiple methods to transmit and spread. The damage caused by
blended threats can be rapid and widespread. Protection from blended threats requires
multiple layers of defense and response mechanisms.
The number of events that satisfy certain criteria. SuperUsers and Administrators define
threshold rules to determine how notifications are to be delivered.
A predetermined period of time during which a given task must be completed. If the
time-out value is reached before or during the execution of a task, the task is cancelled.
The area at the top of a window showing the name of the program, function, document, or
application.
An authentication tool or a device used to send and receive challenges and responses
during the user authentication process. Tokens can be small, handheld hardware devices
similar to pocket calculators or credit cards. See also iButton.
A type of computer network in which all of the computers are arranged schematically in a
circle. A token, which is a special bit pattern, travels around the circle. To send a message,
a computer catches the token, attaches a message to it, and then lets it continue traveling
around the network.
The various rows below the menu bar containing buttons for a commonly used subset of
the commands that are available in the menus.
The logging of inbound and outbound messages based on a predefined criteria. Logging is
usually done to allow for further analysis of the data at a future date or time.
Stand-alone or appended applications that trace a user's path on the Internet and send
information to the target computer. For example, a user could download an application
from a Web site or an email or instant messenger attachment. That attachment can then
obtain confidential information regarding user behavior.
A secret entry point into a computer program that illegitimate users can use to get around
authentication and validation methods that are intended to prevent unauthorized entry.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents