345
Glossary
email bomb
A code that, when executed, sends many messages to the same address(es) for the purpose
of using up disk space or overloading an email or Web server.
email client
An application from which users can create, send, and read email messages.
email server
An application that controls the distribution and storage of email messages.
enabled
A status that indicates that a program, job, policy, or scan is available. For example, if
scheduled scans are enabled, any scheduled scan will execute when the date and time
specified for the scan is reached.
encryption
A method of scrambling or encoding data to prevent unauthorized users from reading or
tampering with the data. Only those who have access to a password or key can decrypt and
use the data. The data can include messages, files, folders, or disks.
end-to-end encryption
The process of using encryption at the point of origin in a network, followed by decryption
at the destination.
ESP (Encapsulated
Security Payload)
A standard that provides confidentiality for IP datagrams or packets by encrypting the
payload data to be protected. Datagrams and packets are the message units that the
Internet Protocol deals with and that the Internet transports.
Ethernet
A local area network (LAN) protocol developed by Xerox Corporation in cooperation with
DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer
rates of 100 Mbps.
Ethernet interface
NIC interfaces on the Network Security or network devices capable of up to 100Mb/s, half
or full-duplex, of ethernet traffic.
event
A message that is generated by a product to indicate that something has happened.
event management
The centralized collection, classification, and normalization of events to enable alerting
and reporting across multivendor managed security products.
event type
A predefined event category that is used for sorting reports and configuring events and
alerts.
event, base
A significant occurrence in a system or application that Symantec Network Security
detects. Base events are the detected activities at the most elemental level.
For detailed descriptions of events, see
“About the Web sites”
on page 22.
exploit
1. A method used to compromise the integrity, availability, or confidentiality of
information or services. 2. A program that automates a method to compromise the
integrity, availability, or confidentiality of information or services.
exposure
A vulnerability that is inherent in a legitimate service or system.
external threat
A threat that originates outside of an organization.
fail-open
The ability of a network appliance to allow network traffic to continue even when the
appliance itself experiences a failure. This differs from
failover
in that other appliance
functionality is not continued by another device when the failure occurs.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...