Symantec 10521146 Administration Guide - Page 342
CSP Client Server, CLI Command Line
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 342 highlights
342 Glossary checksum A count of the number of bits in a transmission unit that is included with the unit so that the receiver can check to see whether the same number of bits arrived. If the counts match, it is assumed that the complete transmission was received. Also called hash. Checksums A checksum is a value that is generated to verify the integrity of data, and stored or transmitted with the data that it verifies. To verify the data, the receiver generates a second checksum and compares the two checksums. If the values match, this confirms that the data has not been altered or contaminated. CLI (Command Line Interface) (Command Line Interface) A utility that provides an alternate way to execute commands in UNIX and Windows NT environments. cluster A group of two or more nodes that are linked together to share attack data and/or to provide continued operation in the event that one server fails. A cluster can include up to 125 Network Security software nodes across multiple network segments within multiple network locations. COM (communications) A location for sending and receiving serial data transmissions. Also called a serial port. port These ports are referred to as COM1, COM2, COM3, and COM4. communications protocol A set of rules that are designed to let computers exchange data. A communications protocol defines issues such as transmission rate, interval type, and mode. compact flash (CF) Digital memory technology providing non-volatile data storage on a compact flash card, readable and writable by a compact flash adaptor on a computer. Network Security console The graphical user interface (GUI) that is provided for centralized administration of software and appliance nodes and node clusters in Symantec Network Security. content scanning or screening The ability to review the actual information that an end user sees when using a specific Internet application, for example, the content of email messages. content virus A virus that is commonly protected against with a virus scanner. See also data-driven attack. control A safeguard that mitigates a vulnerability or exposure and reduces risk. Examples are strong user passwords, applying vendor patches, and removing unneeded services. copy port See interface, monitoring. correlation The intelligent association of disparate items into a related group. CSP (Client Server Protocol) A protocol that packages and sends data from component to component using the various transports that ESM supports. CSP bundles the data and places it on the network in whatever way is appropriate for the transport mechanism. current risk The risk that remains after safeguards have been applied. current vulnerability measure The danger that is posed by a vulnerability after you have accounted for the safeguards that you use to secure it. If you use a valid safeguard, the current vulnerability measure is less than the default vulnerability measure.