832
Glossary
key
A variable value in cryptography that is applied (using an algorithm) to a string or block of
unencrypted text to produce encrypted text. A key is also a series of numbers or symbols that are
used to encode or decode encrypted data.
key management
The establishment and enforcement of message encryption and authentication procedures to provide
privacy-enhanced mail (PEM) services for electronic mail transfer over the Internet.
label
The text attached to an option, box, command, and so on.
LAN (local area network)
A group of computers and other devices in a relatively limited area (such as a single building) that are
connected by a communications link that enables any device to interact with any other device on the
network.
LDAP (Lightweight Directory Access
Protocol)
A software protocol that enables anyone to locate organizations, individuals, and other resources
such as files and devices in a network, whether on the Internet or on a corporate intranet. LDAP is a
lightweight (smaller amount of code) version of Directory Access Protocol (DAP), which is part of
X.500, a standard for directory services in a network.
leased line
A telephone channel that is leased from a common carrier for private use. A leased line is faster and
quieter than a switched line, but generally more expensive.
least privilege
The process of designing operational aspects of a system to operate with a minimum amount of
system privilege. This reduces the authorization level at which various actions are performed and
decreases the chance that a process or user with high privileges can perform unauthorized activity
resulting in a security breach.
license key
A unique identification number used to register a Symantec product.
list box
A dialog box containing a list of items from which a user can choose.
litigation protection
The review and recording of Internet, intranet, and extranet communications that is done to avoid
litigation or the documentation of the communications parties and content in the event of litigation.
LB (Load Balancing)
On clustered security gateways, sharing the traffic load to maintain high throughput.
local attack
An attack that takes place against a computer or a network to which the attacker already has either
physical or legitimate remote access. This can include the computer that the attacker is actually
using or a network to which that computer is connected.
location setting
The network and user entities to which a policy might be applied. A location setting combined with
policy and system settings make up a complete configuration.
log
1. A record of actions and events that take place on a computer. 2. A configured mode for defining
which actions and events that take place on a computer are recorded.
log filter
A filter that controls the events that appear in security gateway logs. Events can be filtered on the
basis of time, event type, security gateway names, components, and other criteria.
logging
The process of storing information about events that occurred on the firewall or network.
logic bomb
The malicious code that is inserted into a program and designed to lie dormant until a specific event
occurs, such as a specific date being reached or a user typing a specific command. At this time, the
logic bomb triggers, usually to destroy or modify data without the knowledge or authorization of the
computer user.
logon procedure
The process of identifying oneself to a computer after connecting to it over a communications line.
During the logon procedure, the computer usually requests a user name and password. On a
computer used by more than one person, the logon procedure identifies authorized users, keeps track
of their usage time, and maintains security by controlling access to sensitive files or actions.
MAC (Media Access Control)
On a network, a computer’s unique hardware number. The MAC address is used by the Media Access
Control sublayer of the Data Link Control (DLC) layer of telecommunication protocols. There is a
different MAC sublayer for each physical device type. The data-link layer is the protocol layer in a
program that handles the moving of data in and out across a physical link in a network.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...