Symantec 10521146 - Network Security 7120 Administration Manual page 363

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

trending
Trojan horse
tunnel
tunneling router
two-factor
authentication
UDP (User Datagram
Protocol)
unstructured threat
upload
UPS (uninterruptible
power supply)
URL (Uniform Resource
Locator)
URL blocking
user
The result of monitoring and analyzing data to show a tendency in some direction over
time.
A rogue program that disguises itself as a legitimate file to lure users to download and run
it. It takes the identity of a trusted application to collect confidential user information or
avoid detection. A Trojan horse neither replicates nor copies itself, but causes damage and
compromises the security of an infected computer.
A process that allows a company to securely use public networks as an alternative to using
its own lines for wide-area communications.
A router or system capable of routing traffic by encrypting it and encapsulating it for
transmission across an untrusted network, for eventual de-encapsulation and decryption.
A type of authentication that is based on something a user knows (factor one) plus
something the user has (factor two). In order to access a network, the user must have both
factors (in the same way that a user must have an ATM card and a personal identification
number [PIN] to retrieve money from a bank account). In order to be authenticated during
the challenge/response process, the user must have this specific (private) information.
A connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP
provides very few error recovery services, offering instead a direct way to send and receive
datagrams over an IP network. UDP is used primarily for broadcasting messages over a
network.
A threat that tends to be technically unskilled or unsophisticated.
To send a file from one computer to another via modem, network, or serial cable. With a
modem-based communications link, the process generally involves the requesting
computer instructing the remote computer to prepare to receive the file on its disk and
wait for the transmission to begin. See also download.
A device that allows your computer and firewall equipment to run for a short time after a
power failure. This allows you to power the device down in an orderly manner. A UPS also
provides protection in the event of a power surge.
The standard addressing system for the World Wide Web. A URL consists of two parts: The
first part indicates the protocol to use (for example http://), and the second part specifies
the IP address or the domain name and the path where the desired information is located
(for example www.securityfocus.com/glossary).
The tracking and denying of user access to undesirable Web sites based on predefined site
content.
A person who is enabled to perform Symantec Network Security administrative tasks,
such as view reports or receive notifications. See also SuperUser, Administrator,
StandardUser, and RestrictedUser.
Glossary
363

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents