Symantec 10521146 Administration Guide - Page 348
Markup Language, HTML Hypertext
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 348 highlights
348 Glossary host-based security HTML (Hypertext Markup Language) HTTP (Hypertext Transfer Protocol) HTTPS (Hypertext Transfer Protocol Secure) hybrid gateway iButton icon inactive incident incident type initialize in-line insertion point insider attack The technique of securing an individual system from attack. Host-based security is operating system-dependent and version-dependent. A standard set of commands used to structure documents and format text so that it can be used on the Web. The set of rules for exchanging files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. Similar to the TCP/IP suite of protocols (the basis for information exchange on the Internet), HTTP is an application protocol. A variation of HTTP that is enhanced by a security mechanism, which is usually Secure Sockets Layer (SSL). An unusual configuration with routers that maintain the complete state of the TCP/IP connections or examine the traffic to try to detect and prevent attack (this may involve the bastion host). If very complicated, it is difficult to attach, and difficult to maintain and audit. A dime-size hardware device that stores the private key portion of the Network Security signature certificate to safeguard the private key against being stolen or compromised. The iButton also confirms the identity of a Network Security node. A graphic representation of a container, document, network object, or other data that users can open or manipulate in an application. A status that indicates that a program, job, policy, or scan is not currently running. For example, when a scheduled scan is waiting for the specified date and time to execute, it is inactive. A security occurrence that requires closure. Incidents are derived from an event or a group of events that are generated by a security point product. When a sensor detects a suspicious event, it correlates the event to an incident containing similar or related events. Multiple related events that indicate a possible attack are categorized as incidents. Incidents derive their names from the highest priority event type that is correlated to the incident. A generic grouping that indicates key aspects of an incident based on attributes of related vulnerabilities. Denial of service (DoS) and root compromise are examples of such groupings. To prepare for use. In communications, to set a modem and software parameters at the start of a session. A method of connecting to the network that makes the device an integral part of the network traffic path or route. The place where typed text or a dragged or pasted selection appears. An attack originating from inside a protected network.