Symantec 10521146 Administration Guide - Page 342

CSP Client Server, CLI Command Line

Page 342 highlights

342 Glossary checksum A count of the number of bits in a transmission unit that is included with the unit so that the receiver can check to see whether the same number of bits arrived. If the counts match, it is assumed that the complete transmission was received. Also called hash. Checksums A checksum is a value that is generated to verify the integrity of data, and stored or transmitted with the data that it verifies. To verify the data, the receiver generates a second checksum and compares the two checksums. If the values match, this confirms that the data has not been altered or contaminated. CLI (Command Line Interface) (Command Line Interface) A utility that provides an alternate way to execute commands in UNIX and Windows NT environments. cluster A group of two or more nodes that are linked together to share attack data and/or to provide continued operation in the event that one server fails. A cluster can include up to 125 Network Security software nodes across multiple network segments within multiple network locations. COM (communications) A location for sending and receiving serial data transmissions. Also called a serial port. port These ports are referred to as COM1, COM2, COM3, and COM4. communications protocol A set of rules that are designed to let computers exchange data. A communications protocol defines issues such as transmission rate, interval type, and mode. compact flash (CF) Digital memory technology providing non-volatile data storage on a compact flash card, readable and writable by a compact flash adaptor on a computer. Network Security console The graphical user interface (GUI) that is provided for centralized administration of software and appliance nodes and node clusters in Symantec Network Security. content scanning or screening The ability to review the actual information that an end user sees when using a specific Internet application, for example, the content of email messages. content virus A virus that is commonly protected against with a virus scanner. See also data-driven attack. control A safeguard that mitigates a vulnerability or exposure and reduces risk. Examples are strong user passwords, applying vendor patches, and removing unneeded services. copy port See interface, monitoring. correlation The intelligent association of disparate items into a related group. CSP (Client Server Protocol) A protocol that packages and sends data from component to component using the various transports that ESM supports. CSP bundles the data and places it on the network in whatever way is appropriate for the transport mechanism. current risk The risk that remains after safeguards have been applied. current vulnerability measure The danger that is posed by a vulnerability after you have accounted for the safeguards that you use to secure it. If you use a valid safeguard, the current vulnerability measure is less than the default vulnerability measure.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

342
Glossary
checksum
A count of the number of bits in a transmission unit that is included with the unit so that
the receiver can check to see whether the same number of bits arrived. If the counts
match, it is assumed that the complete transmission was received. Also called hash.
Checksums
A checksum is a value that is generated to verify the integrity of data, and stored or
transmitted with the data that it verifies. To verify the data, the receiver generates a
second checksum and compares the two checksums. If the values match, this confirms
that the data has not been altered or contaminated.
CLI (Command Line
Interface)
(Command Line Interface) A utility that provides an alternate way to execute commands in
UNIX and Windows NT environments.
cluster
A group of two or more nodes that are linked together to share attack data and/or to
provide continued operation in the event that one server fails. A cluster can include up to
125 Network Security software nodes across multiple network segments within multiple
network locations.
COM (communications)
port
A location for sending and receiving serial data transmissions. Also called a serial port.
These ports are referred to as COM1, COM2, COM3, and COM4.
communications
protocol
A set of rules that are designed to let computers exchange data. A communications
protocol defines issues such as transmission rate, interval type, and mode.
compact flash (CF)
Digital memory technology providing non-volatile data storage on a compact flash card,
readable and writable by a compact flash adaptor on a computer.
Network Security
console
The graphical user interface (GUI) that is provided for centralized administration of
software and appliance nodes and node clusters in Symantec Network Security.
content scanning or
screening
The ability to review the actual information that an end user sees when using a specific
Internet application, for example, the content of email messages.
content virus
A virus that is commonly protected against with a virus scanner. See also
data-driven
attack
.
control
A safeguard that mitigates a vulnerability or exposure and reduces risk. Examples are
strong user passwords, applying vendor patches, and removing unneeded services.
copy port
See
interface, monitoring
.
correlation
The intelligent association of disparate items into a related group.
CSP (Client Server
Protocol)
A protocol that packages and sends data from component to component using the various
transports that ESM supports. CSP bundles the data and places it on the network in
whatever way is appropriate for the transport mechanism.
current risk
The risk that remains after safeguards have been applied.
current vulnerability
measure
The danger that is posed by a vulnerability after you have accounted for the safeguards
that you use to secure it. If you use a valid safeguard, the current vulnerability measure is
less than the default vulnerability measure.