HP t5710 HP Sygate Security Agent User Guide - Page 74

User Datagram Protocol UDP, virtual private network VPN, virus, VPN enforcement, vulnerability scan

Page 74 highlights

HP Sygate Security Agent User Guide User Datagram Protocol (UDP): A communications protocol for the Internet network layer, transport layer, and session layer that uses the Internet Protocol (IP) when sending a datagram message from one computer to another. UDP does not guarantee reliable communication or provide validated sequencing of the packets. V virtual private network (VPN): A secure network connection that connects different corporate network sites, allows remote users to connect to an enterprise network, and allows controlled access to different corporate networks. Although a VPN provides a secure tunnel for network traffic, it leaves connection points open to attack. Working with a corporate VPN server, Sygate Enforcer ensures that only computers running a valid security policy of the Sygate Security Agent can gain access to an enterprise network through a VPN. See also VPN enforcement. virus: A program that is designed to spread from computer to computer on its own, potentially damaging the system software by corrupting or erasing data, using available memory, or by annoying the user by altering data. A virus is designed to replicate. Generally, it is spread by infecting other files. VPN enforcement: A way to verify that VPN users are running the Sygate Security Agent and meet the security requirements before being granted access to the network. See also enforcement, virtual private network (VPN). vulnerability scan: An attempt to use security attacks to detect security weaknesses in a computer. The Sygate Security Agent includes a Test button that assesses an Agent's vulnerability to attack. It requires a public IP address. See also port scan. W WINS: Short for Windows Internet Naming Service, a system that determines the IP address associated with a particular network computer. This is called name resolution. WINS supports network client and server computers running Windows and can provide name resolution for other computers with special arrangements. Determining the IP address for a computer is a complex process when DHCP servers assign IP addresses dynamically. For example, it is possible for DHCP to assign a different IP address to a client each time a computer logs into the network. WINS uses a distributed database that is automatically updated with the names of computers currently available and the IP address assigned to each one. DNS is an alternative system for name resolution suitable for network computers with fixed IP addresses. worm: A type of computer virus that can replicate itself over a computer network and perform destructive tasks such as using up computer memory resources. Worms do not infect other files as viruses typically do, but instead worms make copies of themselves over and over depleting system resources (hard drive space) or depleting bandwidth (by spreading over shared network resources). See also virus. 64

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

HP Sygate Security Agent User Guide
User Datagram Protocol (UDP):
A communications protocol for the Internet network
layer, transport layer, and session layer that uses the Internet Protocol (IP) when
sending a datagram message from one computer to another. UDP does not
guarantee reliable communication or provide validated sequencing of the packets.
V
virtual private network (VPN):
A secure network connection that connects different
corporate network sites, allows remote users to connect to an enterprise network,
and allows controlled access to different corporate networks. Although a VPN
provides a secure tunnel for network traffic, it leaves connection points open to
attack. Working with a corporate VPN server, Sygate Enforcer ensures that only
computers running a valid security policy of the Sygate Security Agent can gain
access to an enterprise network through a VPN. See also VPN enforcement.
virus:
A program that is designed to spread from computer to computer on its own,
potentially damaging the system software by corrupting or erasing data, using
available memory, or by annoying the user by altering data. A virus is designed to
replicate. Generally, it is spread by infecting other files.
VPN enforcement:
A way to verify that VPN users are running the Sygate Security Agent
and meet the security requirements before being granted access to the network. See
also enforcement, virtual private network (VPN).
vulnerability scan:
An attempt to use security attacks to detect security weaknesses in a
computer. The Sygate Security Agent includes a Test button that assesses an Agent’s
vulnerability to attack. It requires a public IP address. See also port scan.
W
WINS:
Short for Windows Internet Naming Service, a system that determines the IP
address associated with a particular network computer. This is called name
resolution. WINS supports network client and server computers running Windows
and can provide name resolution for other computers with special arrangements.
Determining the IP address for a computer is a complex process when DHCP
servers assign IP addresses dynamically. For example, it is possible for DHCP to
assign a different IP address to a client each time a computer logs into the network.
WINS uses a distributed database that is automatically updated with the names of
computers currently available and the IP address assigned to each one. DNS is an
alternative system for name resolution suitable for network computers with fixed IP
addresses.
worm:
A type of computer virus that can replicate itself over a computer network and
perform destructive tasks such as using up computer memory resources. Worms do
not infect other files as viruses typically do, but instead worms make copies of
themselves over and over depleting system resources (hard drive space) or depleting
bandwidth (by spreading over shared network resources). See also virus.
64