363
Glossary
trending
The result of monitoring and analyzing data to show a tendency in some direction over
time.
Trojan horse
A rogue program that disguises itself as a legitimate file to lure users to download and run
it. It takes the identity of a trusted application to collect confidential user information or
avoid detection. A Trojan horse neither replicates nor copies itself, but causes damage and
compromises the security of an infected computer.
tunnel
A process that allows a company to securely use public networks as an alternative to using
its own lines for wide-area communications.
tunneling router
A router or system capable of routing traffic by encrypting it and encapsulating it for
transmission across an untrusted network, for eventual de-encapsulation and decryption.
two-factor
authentication
A type of authentication that is based on something a user knows (factor one) plus
something the user has (factor two). In order to access a network, the user must have both
factors (in the same way that a user must have an ATM card and a personal identification
number [PIN] to retrieve money from a bank account). In order to be authenticated during
the challenge/response process, the user must have this specific (private) information.
UDP (User Datagram
Protocol)
A connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP
provides very few error recovery services, offering instead a direct way to send and receive
datagrams over an IP network. UDP is used primarily for broadcasting messages over a
network.
unstructured threat
A threat that tends to be technically unskilled or unsophisticated.
upload
To send a file from one computer to another via modem, network, or serial cable. With a
modem-based communications link, the process generally involves the requesting
computer instructing the remote computer to prepare to receive the file on its disk and
wait for the transmission to begin. See also
download
.
UPS (uninterruptible
power supply)
A device that allows your computer and firewall equipment to run for a short time after a
power failure. This allows you to power the device down in an orderly manner. A UPS also
provides protection in the event of a power surge.
URL (Uniform Resource
Locator)
The standard addressing system for the World Wide Web. A URL consists of two parts: The
first part indicates the protocol to use (for example http://), and the second part specifies
the IP address or the domain name and the path where the desired information is located
(for example www.securityfocus.com/glossary).
URL blocking
The tracking and denying of user access to undesirable Web sites based on predefined site
content.
user
A person who is enabled to perform Symantec Network Security administrative tasks,
such as view reports or receive notifications. See also
SuperUser
,
Administrator
,
StandardUser
, and
RestrictedUser
.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...