362 Glossary
Telnet
The main Internet protocol for creating an interactive control connection with a remote
computer. Telnet is the most common way of allowing users a remote connection to a
network, as with telecommuters or remote workers.
text field
The area in which a user can type text.
thin client
A low-cost computing device that works in a server-centric computing model. Thin clients
typically do not require state-of-the-art, powerful processors and large amounts of RAM
and ROM because they access applications from a central server or network. Thin clients
can operate in a server-based computing environment.
threat
A circumstance, event, or person with the potential to cause harm to a system in the form
of destruction, disclosure, modification of data, and/or denial of service.
threat assessment
The identification and quantification of human threats to an organization or its systems.
threat, blended
An attack that uses multiple methods to transmit and spread. The damage caused by
blended threats can be rapid and widespread. Protection from blended threats requires
multiple layers of defense and response mechanisms.
threshold
The number of events that satisfy certain criteria.
SuperUser
s and
Administrator
s define
threshold rules to determine how notifications are to be delivered.
time-out
A predetermined period of time during which a given task must be completed. If the
time-out value is reached before or during the execution of a task, the task is cancelled.
title bar
The area at the top of a window showing the name of the program, function, document, or
application.
token
An authentication tool or a device used to send and receive challenges and responses
during the user authentication process. Tokens can be small, handheld hardware devices
similar to pocket calculators or credit cards. See also
iButton
.
token ring
A type of computer network in which all of the computers are arranged schematically in a
circle. A token, which is a special bit pattern, travels around the circle. To send a message,
a computer catches the token, attaches a message to it, and then lets it continue traveling
around the network.
toolbar
The various rows below the menu bar containing buttons for a commonly used subset of
the commands that are available in the menus.
tracking
The logging of inbound and outbound messages based on a predefined criteria. Logging is
usually done to allow for further analysis of the data at a future date or time.
trackware
Stand-alone or appended applications that trace a user's path on the Internet and send
information to the target computer. For example, a user could download an application
from a Web site or an email or instant messenger attachment. That attachment can then
obtain confidential information regarding user behavior.
trapdoor
A secret entry point into a computer program that illegitimate users can use to get around
authentication and validation methods that are intended to prevent unauthorized entry.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...