Symantec 10521146 Administration Guide - Page 345
ESP Encapsulated, Security Payload
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 345 highlights
Glossary 345 email bomb A code that, when executed, sends many messages to the same address(es) for the purpose of using up disk space or overloading an email or Web server. email client An application from which users can create, send, and read email messages. email server An application that controls the distribution and storage of email messages. enabled A status that indicates that a program, job, policy, or scan is available. For example, if scheduled scans are enabled, any scheduled scan will execute when the date and time specified for the scan is reached. encryption A method of scrambling or encoding data to prevent unauthorized users from reading or tampering with the data. Only those who have access to a password or key can decrypt and use the data. The data can include messages, files, folders, or disks. end-to-end encryption The process of using encryption at the point of origin in a network, followed by decryption at the destination. ESP (Encapsulated Security Payload) A standard that provides confidentiality for IP datagrams or packets by encrypting the payload data to be protected. Datagrams and packets are the message units that the Internet Protocol deals with and that the Internet transports. Ethernet A local area network (LAN) protocol developed by Xerox Corporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 100 Mbps. Ethernet interface NIC interfaces on the Network Security or network devices capable of up to 100Mb/s, half or full-duplex, of ethernet traffic. event A message that is generated by a product to indicate that something has happened. event management The centralized collection, classification, and normalization of events to enable alerting and reporting across multivendor managed security products. event type A predefined event category that is used for sorting reports and configuring events and alerts. event, base A significant occurrence in a system or application that Symantec Network Security detects. Base events are the detected activities at the most elemental level. For detailed descriptions of events, see "About the Web sites" on page 22. exploit 1. A method used to compromise the integrity, availability, or confidentiality of information or services. 2. A program that automates a method to compromise the integrity, availability, or confidentiality of information or services. exposure A vulnerability that is inherent in a legitimate service or system. external threat A threat that originates outside of an organization. fail-open The ability of a network appliance to allow network traffic to continue even when the appliance itself experiences a failure. This differs from failover in that other appliance functionality is not continued by another device when the failure occurs.