Symantec 10521146 - Network Security 7120 Administration Manual page 365

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

VPN (virtual private
network)
vulnerability
WAP (Wireless
Application Protocol)
warning
watchdog process
Web attack
Web denial of service
wildcard character
worm
wrap
WWW (World Wide Web) An application on the Internet that allows for the exchange of documents formatted in
X.509
zero-day detection
zombie
A network that has characteristics of a private network such as a LAN, but which is built
on a public network such as the Internet. VPNs allow organizations to implement private
networks between geographically separate offices and remote or mobile employees by
means of encryption and tunneling protocols.
A design, administrative, or implementation weakness or flaw in hardware, firmware, or
software. If exploited, it could lead to an unacceptable impact in the form of unauthorized
access to information or disruption of critical processing. A weakness or flaw that lets a
human threat exploit or compromise a network or system.
An open global standard for communications between a mobile handset and the Internet
or other computer applications as defined by the WAP forum.
A message that informs the user that performing an action can or will result in data loss
on the user's system.
A strategy for supporting failover, high availability, and redundancy. The watchdog
process deploys a group of Network Security nodes in a hierarchical group so that one is
active and the remaining are standby. If the active node fails, a standby node takes its
place so that the transition is seamless.
An attack from the outside that is aimed at Web server vulnerabilities.
A denial of service attack that specifically targets a Web server.
A symbol that enables multiple matching values to be returned based on a shared feature.
A special type of virus. A worm does not attach itself to other programs like a traditional
virus, but creates copies of itself, which create even more copies.
A program's ability to continue displaying information on a new line or page when the end
of a line or page is reached.
Hypertext Markup Language (HTML), which facilitates text, graphics, and layout. The
World Wide Web is also a system of Internet servers that support specially formatted
documents.
The most widely used standard for defining digital certificates. X.509 is actually an ITU
Recommendation, which means that it has not yet been officially defined or approved.
The ability to detect newly emerging, previously unknown, variant, and/or polymorphic
exploits as they occur, without requiring prior exposure or signatures.
A computer that is used by hackers to attack the computers that they are targeting for
denial of service. The legitimate user of the zombie may not be aware that the computer
has been controlled by the hacker; however, if the computer is used to launch a damaging
attack, the legitimate user may be investigated or held legally responsible.
Glossary
365

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents