
842
Glossary
Symantec management console
A Web-based console that provides SESA content viewing and management capabilities, letting
Administrators perform Event Management, Group Management, and Security Policy Configuration
Management.
Symantec Security Response
The Symantec team of intrusion experts, security engineers, virus hunters, and global technical
support teams that work to provide security coverage for enterprise businesses and consumers.
Symantec Security Response delivers security protection through product security policies and best
practice guidelines that can be updated and distributed through automated processes. Additionally,
Symantec Security Response provides rapid security protection through its incident response
program, including emergency antivirus signatures, definitions, and policies, as well as outbound
communications such as alerting services.
symmetric encryption
An encryption method involving a single secret key for both encryption and decryption. The sender
of the encrypted message must give that key to the recipient before the recipient can decrypt it.
Although this method of encryption is efficient, there is a danger that if the secret key is intercepted,
the message can be read by an unintended audience.
SYN attack
A type of attack. When a session is initiated between the Transmission Control Program (TCP) client
and server in a network, a very small buffer space exists to handle the handshaking (often referred to
as the three-way handshake) or exchange of messages that sets up the session. The session
establishing includes a SYN field that identifies the sequence in the message exchange. An attacker
can send a number of connection requests very rapidly and then fail to respond to the reply. This
leaves the first packet in the buffer so that other, legitimate connection requests can’t be
accommodated. Although the packet in the buffer is dropped after a certain period of time without a
reply, the effect of many of these bogus connection requests is to make it difficult for legitimate
requests for a session to get established. In general, this problem depends on the operating system
providing correct settings or allowing the network administrator to tune the size of the buffer and
the time-out period.
synchronize
To copy files between two folders on host and remote computers to make the folders identical to one
another. Copying occurs in both directions. If there are two files with the same name, the file with the
most current date and time is copied. Files are never deleted during the synchronization process. See
also clone.
system
A set of related elements that work together to accomplish a task or provide a service. For example, a
computer system includes both hardware and software.
target association
For security gateways, the relationship between a target and the policy-location pair that is applied to
it upon activation.
TCP (Transmission Control Protocol)
The protocol in the suite of protocols known as TCP/IP that is responsible for breaking down
messages into packets for transmission over a TCP/IP network such as the Internet. Upon arrival at
the recipient computer, TCP is responsible for recombining the packets in the same order in which
they were originally sent and for ensuring that no data from the message has been misplaced in the
process of transmission.
TCP/IP (Transmission Control Protocol/
Internet Protocol)
The suite of protocols that allows different computer platforms using different operating systems
(such as Windows, MacOS, or UNIX) or different software applications to communicate. Although
TCP and IP are two distinct protocols, each of which serves a specific communicational purpose, the
term TCP/IP is used to refer to a set of protocols, including Hypertext Transfer Protocol (HTTP), File
Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), and many
others. This set of protocols allows computers on the Internet to exchange different types of
information using different applications.
Telnet
The main Internet protocol for creating an interactive control connection with a remote computer.
Telnet is the most common way of allowing users a remote connection to a network, as with
telecommuters or remote workers.
text field
The area in which a user can type text.
threat
A circumstance, event, or person with the potential to cause harm to a system in the form of
destruction, disclosure, modification of data, or denial of service.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...