Symantec 10521146 Administration Guide - Page 343

on Web servers. Each server has a Hypertext Transfer Protocol Daemon HTTPD

Page 343 highlights

Glossary 343 daemon A program that runs continuously and exists for the purpose of handling periodic service requests that a computer system expects to receive. The daemon forwards the requests to other programs (or processes) as appropriate. A typical example of a daemon can be seen on Web servers. Each server has a Hypertext Transfer Protocol Daemon (HTTPD) that continually waits for requests to come in from Web clients and their users. data rate The speed at which information is moved from one location to another. Data rates are commonly measured in kilobits (thousand bits), megabits (million bits), and megabytes (million bytes) per second. Modems, for example, are generally measured in kilobits per second (Kbps). data transfer The movement of information from one location to another. The speed of transfer is called the data rate or data transfer rate. data transmission The electronic transfer of information from a sending device to a receiving device. data-driven attack A form of intrusion in which the attack is encoded in seemingly innocuous data. It is subsequently executed by a user or other software to actually implement the attack. decode To convert encoded text to plain text through the use of a code. decrypt To convert either encoded or enciphered text into plain text. dedicated device A special-purpose device. Although it is capable of performing other duties, it is assigned to only one. denial of service (DoS) attack A type of attack in which a user or program takes up all of the system resources by launching a multitude of requests, leaving no resources and thereby denying service to other users. Typically, denial of service attacks are aimed at bandwidth control. deployment The installation of a network of security products, such as Symantec Network Security (nodes and Network Security console), Symantec Network Security 7100 Series appliances, and Symantec Network Security Smart Agents to form an enterprise security environment. DES (Data Encryption Standard) A widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. There are 72,000,000,000,000,000 (72 quadrillion) or more possible encryption keys that can be used. For each given message, the key is chosen at random from among this enormous number of keys. Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key. dial To initiate a connection via LAN, modem, or direct connection, whether or not actual dialing is involved. dialer A program that uses your system, without your permission or knowledge, to dial out through the Internet to a 900 number or FTP site, typically to accrue charges. dialog box A secondary window containing command buttons and options available to users for carrying out a particular command or task.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

343
Glossary
daemon
A program that runs continuously and exists for the purpose of handling periodic service
requests that a computer system expects to receive. The daemon forwards the requests to
other programs (or processes) as appropriate. A typical example of a daemon can be seen
on Web servers. Each server has a Hypertext Transfer Protocol Daemon (HTTPD) that
continually waits for requests to come in from Web clients and their users.
data rate
The speed at which information is moved from one location to another. Data rates are
commonly measured in kilobits (thousand bits), megabits (million bits), and megabytes
(million bytes) per second. Modems, for example, are generally measured in kilobits per
second (Kbps).
data transfer
The movement of information from one location to another. The speed of transfer is called
the data rate or data transfer rate.
data transmission
The electronic transfer of information from a sending device to a receiving device.
data-driven attack
A form of intrusion in which the attack is encoded in seemingly innocuous data. It is
subsequently executed by a user or other software to actually implement the attack.
decode
To convert encoded text to plain text through the use of a code.
decrypt
To convert either encoded or enciphered text into plain text.
dedicated device
A special-purpose device. Although it is capable of performing other duties, it is assigned
to only one.
denial of service (DoS)
attack
A type of attack in which a user or program takes up all of the system resources by
launching a multitude of requests, leaving no resources and thereby denying service to
other users. Typically, denial of service attacks are aimed at bandwidth control.
deployment
The installation of a network of security products, such as Symantec Network Security
(nodes and Network Security console), Symantec Network Security 7100 Series appliances,
and Symantec Network Security Smart Agents to form an enterprise security
environment.
DES (Data Encryption
Standard)
A widely-used method of data encryption using a private (secret) key that was judged so
difficult to break by the U.S. government that it was restricted for exportation to other
countries. There are 72,000,000,000,000,000 (72 quadrillion) or more possible encryption
keys that can be used. For each given message, the key is chosen at random from among
this enormous number of keys. Like other private key cryptographic methods, both the
sender and the receiver must know and use the same private key.
dial
To initiate a connection via LAN, modem, or direct connection, whether or not actual
dialing is involved.
dialer
A program that uses your system, without your permission or knowledge, to dial out
through the Internet to a 900 number or FTP site, typically to accrue charges.
dialog box
A secondary window containing command buttons and options available to users for
carrying out a particular command or task.