Symantec 10521146 Administration Guide - Page 345

ESP Encapsulated, Security Payload

Page 345 highlights

Glossary 345 email bomb A code that, when executed, sends many messages to the same address(es) for the purpose of using up disk space or overloading an email or Web server. email client An application from which users can create, send, and read email messages. email server An application that controls the distribution and storage of email messages. enabled A status that indicates that a program, job, policy, or scan is available. For example, if scheduled scans are enabled, any scheduled scan will execute when the date and time specified for the scan is reached. encryption A method of scrambling or encoding data to prevent unauthorized users from reading or tampering with the data. Only those who have access to a password or key can decrypt and use the data. The data can include messages, files, folders, or disks. end-to-end encryption The process of using encryption at the point of origin in a network, followed by decryption at the destination. ESP (Encapsulated Security Payload) A standard that provides confidentiality for IP datagrams or packets by encrypting the payload data to be protected. Datagrams and packets are the message units that the Internet Protocol deals with and that the Internet transports. Ethernet A local area network (LAN) protocol developed by Xerox Corporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 100 Mbps. Ethernet interface NIC interfaces on the Network Security or network devices capable of up to 100Mb/s, half or full-duplex, of ethernet traffic. event A message that is generated by a product to indicate that something has happened. event management The centralized collection, classification, and normalization of events to enable alerting and reporting across multivendor managed security products. event type A predefined event category that is used for sorting reports and configuring events and alerts. event, base A significant occurrence in a system or application that Symantec Network Security detects. Base events are the detected activities at the most elemental level. For detailed descriptions of events, see "About the Web sites" on page 22. exploit 1. A method used to compromise the integrity, availability, or confidentiality of information or services. 2. A program that automates a method to compromise the integrity, availability, or confidentiality of information or services. exposure A vulnerability that is inherent in a legitimate service or system. external threat A threat that originates outside of an organization. fail-open The ability of a network appliance to allow network traffic to continue even when the appliance itself experiences a failure. This differs from failover in that other appliance functionality is not continued by another device when the failure occurs.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

345
Glossary
email bomb
A code that, when executed, sends many messages to the same address(es) for the purpose
of using up disk space or overloading an email or Web server.
email client
An application from which users can create, send, and read email messages.
email server
An application that controls the distribution and storage of email messages.
enabled
A status that indicates that a program, job, policy, or scan is available. For example, if
scheduled scans are enabled, any scheduled scan will execute when the date and time
specified for the scan is reached.
encryption
A method of scrambling or encoding data to prevent unauthorized users from reading or
tampering with the data. Only those who have access to a password or key can decrypt and
use the data. The data can include messages, files, folders, or disks.
end-to-end encryption
The process of using encryption at the point of origin in a network, followed by decryption
at the destination.
ESP (Encapsulated
Security Payload)
A standard that provides confidentiality for IP datagrams or packets by encrypting the
payload data to be protected. Datagrams and packets are the message units that the
Internet Protocol deals with and that the Internet transports.
Ethernet
A local area network (LAN) protocol developed by Xerox Corporation in cooperation with
DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer
rates of 100 Mbps.
Ethernet interface
NIC interfaces on the Network Security or network devices capable of up to 100Mb/s, half
or full-duplex, of ethernet traffic.
event
A message that is generated by a product to indicate that something has happened.
event management
The centralized collection, classification, and normalization of events to enable alerting
and reporting across multivendor managed security products.
event type
A predefined event category that is used for sorting reports and configuring events and
alerts.
event, base
A significant occurrence in a system or application that Symantec Network Security
detects. Base events are the detected activities at the most elemental level.
For detailed descriptions of events, see
²About the Web sites³
on page 22.
exploit
1. A method used to compromise the integrity, availability, or confidentiality of
information or services. 2. A program that automates a method to compromise the
integrity, availability, or confidentiality of information or services.
exposure
A vulnerability that is inherent in a legitimate service or system.
external threat
A threat that originates outside of an organization.
fail-open
The ability of a network appliance to allow network traffic to continue even when the
appliance itself experiences a failure. This differs from
failover
in that other appliance
functionality is not continued by another device when the failure occurs.