Symantec 10521146 Administration Guide - Page 344

DSX Dynamic Security, DNS Domain Name

Page 344 highlights

344 Glossary digital certificate A digital certificate is an electronic credit card that establishes a user's credentials when doing business or other transactions on the Web. It is issued by a Certificate Authority (CA). It contains the user's name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting and decrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. digital signature An electronic rather than a written signature that can be used by someone to authenticate the identity of the sender of a message or of the signer of a document. It can also be used to ensure that the original content of the message or document that has been conveyed is unchanged. Additional benefits to the use of a digital signature are that it is easily transportable, cannot be easily repudiated, cannot be imitated by someone else, and can be automatically time-stamped. direct connection A form of data communication in which one computer is directly connected to another, usually via a null modem cable. disabled A status that indicates that a program, job, policy, or scan is not available. For example, if scheduled scans are disabled, a scheduled scan does not execute when the date and time specified for the scan is reached. DMZ (de-militarized zone) A network added between a protected network and an external network to provide an additional layer of security. Sometimes called a perimeter network. DNS (Domain Name System) A hierarchical system of host naming that groups TCP/IP hosts into categories. For example, in the Internet naming scheme, names with .com extensions identify hosts in commercial businesses. DNS spoofing The act of breaching the trust relationship by assuming the Domain Name System (DNS) name of another system. This is usually accomplished by either corrupting the name service cache of a victim system or by compromising a Domain Name Server for a valid domain. domain A group of computers or devices that share a common directory database and are administered as a unit. On the Internet, domains organize network addresses into hierarchical subsets. For example, the .com domain identifies host systems that are used for commercial business. download To transfer data from one computer to another, usually over a modem or network. Usually refers to the act of transferring a file from the Internet, a bulletin board system (BBS), or an online service to one's own computer. DSX (Dynamic Security Extension) A proprietary technology that is patented and works in the following way. The operating system has a system call (or vector) table that contains memory address pointers for each system call. These pointers point to a location in memory where the actual kernel code of the system calls resides. DSX stores the address pointers for the security-sensitive system calls and then redirects these pointers to the corresponding SECURED system call code, which is located elsewhere in memory.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

344
Glossary
digital certificate
A digital certificate is an electronic credit card that establishes a user’s credentials when
doing business or other transactions on the Web. It is issued by a Certificate Authority
(CA). It contains the user’s name, a serial number, expiration dates, a copy of the
certificate holder’s public key (used for encrypting and decrypting messages and digital
signatures), and the digital signature of the certificate-issuing authority so that a
recipient can verify that the certificate is real.
digital signature
An electronic rather than a written signature that can be used by someone to authenticate
the identity of the sender of a message or of the signer of a document. It can also be used
to ensure that the original content of the message or document that has been conveyed is
unchanged. Additional benefits to the use of a digital signature are that it is easily
transportable, cannot be easily repudiated, cannot be imitated by someone else, and can
be automatically time-stamped.
direct connection
A form of data communication in which one computer is directly connected to another,
usually via a null modem cable.
disabled
A status that indicates that a program, job, policy, or scan is not available. For example, if
scheduled scans are disabled, a scheduled scan does not execute when the date and time
specified for the scan is reached.
DMZ (de-militarized
zone)
A network added between a protected network and an external network to provide an
additional layer of security. Sometimes called a perimeter network.
DNS (Domain Name
System)
A hierarchical system of host naming that groups TCP/IP hosts into categories. For
example, in the Internet naming scheme, names with .com extensions identify hosts in
commercial businesses.
DNS spoofing
The act of breaching the trust relationship by assuming the Domain Name System (DNS)
name of another system. This is usually accomplished by either corrupting the name
service cache of a victim system or by compromising a Domain Name Server for a valid
domain.
domain
A group of computers or devices that share a common directory database and are
administered as a unit. On the Internet, domains organize network addresses into
hierarchical subsets. For example, the .com domain identifies host systems that are used
for commercial business.
download
To transfer data from one computer to another, usually over a modem or network. Usually
refers to the act of transferring a file from the Internet, a bulletin board system (BBS), or
an online service to one’s own computer.
DSX (Dynamic Security
Extension)
A proprietary technology that is patented and works in the following way. The operating
system has a system call (or vector) table that contains memory address pointers for each
system call. These pointers point to a location in memory where the actual kernel code of
the system calls resides. DSX stores the address pointers for the security-sensitive system
calls and then redirects these pointers to the corresponding SECURED system call code,
which is located elsewhere in memory.