Symantec 10521146 - Network Security 7120 Administration Manual page 364

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

364 Glossary
user account
user authentication
user identification
user name
user-level services
UUCP (UNIX-to-UNIX
Copy)
uuencode
validation
vandal
virtual network
perimeter
virus
A file that contains information that identifies a user to the system. This information
includes the user name and password, the groups in which the user account has
membership, and the rights and permissions that the user has for using the system and
accessing its resources.
A process that verifies a user's identity to ensure that the person requesting access to the
private network is, in fact, that person to whom entry is authorized.
The process by which a user is identified to the system as a valid user (as opposed to
authentication, which is the process of establishing that the user is indeed that user and
has a right to use the system).
A form of authentication that is in place to ensure that the user is authorized to use the
services being requested. The user name also signifies the primary user or users of a
particular computer.
Commands or utilities such as ssh and syslog which are available from the underlying
operating system.
A set of UNIX programs for copying (sending) files between different UNIX systems and
for sending commands to be executed on another system.
A data encoding standard developed to translate or convert a file or email attachment (an
image, text file, or program) from its binary or bit-stream representation into the 7-bit
ASCII set of text characters.
The process of checking a configuration for completeness, ensuring that all values are
valid, and determining if all logical and physical references can be resolved.
An executable file (usually an applet or an ActiveX control) associated with a Web page
that is designed to be harmful, malicious, or at the very least inconvenient to the user.
Because these applets or application programs can be embedded in any HTML file, they
can also arrive as an email attachment or automatically as the result of being pushed to
the user. Vandals can be viewed as viruses that can arrive over the Internet stuck to a Web
page. Vandals are sometimes referred to as hostile applets.
A network that appears to be a single protected network behind firewalls, but which
actually encompasses encrypted virtual links over untrusted networks.
A piece of programming code inserted into other programming to cause some unexpected
and, for the victim, usually undesirable event. Viruses can be transmitted by downloading
programming from other sites or present on a diskette. The source of the file you are
downloading or of a diskette you have received is often unaware of the virus. The virus lies
dormant until circumstances cause the computer to execute its code. Some viruses are
playful in intent and effect, but some can be harmful, erasing data or causing your hard
disk to require reformatting.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents