347
Glossary
FTP (File Transfer
Protocol)
The simplest way to exchange files between computers on the Internet. Like the Hypertext
Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the
Simple Mail Transfer Protocol (SMTP), which transfers email, FTP is an application
protocol that uses the Internet's TCP/IP protocols.
gateway
A network point that acts as an entrance to another network. In a company network, a
proxy server acts as a gateway between the internal network and the Internet. A gateway
can also be any computer or service that passes packets from one network to another
network during their trip across the Internet.
gating
See
blocking
.
gigabit Ethernet
interface
NIC interfaces on the Network Security or network devices capable of up to 1000Mb/s, half
or full-duplex, of ethernet traffic.
granularity
The relative fineness or coarseness by which a mechanism can be adjusted.
greyware
Programs that do not contain viruses and that are not obviously malicious, but which can
be annoying or even harmful to the user. For example, hack tools, accessware, spyware,
adware, dialers, and joke programs.
group
A category of user accounts in Symantec Network Security that contains specific,
predefined permissions and rights. See also
user account
.
group, monitoring
A subset of a cluster.
hack
A program in which a significant portion of the code was originally another program.
hack tool
A tool that is used by a hacker to gain unauthorized access to a computer. One type of hack
tool is a keystroke logger, which is a program that tracks and records individual keystrokes
and can send this information back to the hacker.
hacker
A term used by some to mean a clever programmer and by others, especially journalists or
their editors, to mean someone who tries to break into computer systems.
hardware setup
A set of hardware parameters, such as modem type, port/device, and data rate, that is used
as a singular named resource in launching a host or remote session.
heuristic
A technology that uses experience-based knowledge rather than virus definitions to
identify new threats by examining files for suspicious behavior.
high availability
See
watchdog process
.
hijacking
The control of a connection taken by the attacker after the user authentication has been
established.
host
1. In a network environment, a computer that provides data and services to other
computers. Services might include peripheral devices, such as printers, data storage,
email, or World Wide Web access. 2. In a remote control environment, a computer to which
remote users connect to access or exchange data.
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...