Symantec 10521146 Administration Guide - Page 348

Markup Language, HTML Hypertext

Page 348 highlights

348 Glossary host-based security HTML (Hypertext Markup Language) HTTP (Hypertext Transfer Protocol) HTTPS (Hypertext Transfer Protocol Secure) hybrid gateway iButton icon inactive incident incident type initialize in-line insertion point insider attack The technique of securing an individual system from attack. Host-based security is operating system-dependent and version-dependent. A standard set of commands used to structure documents and format text so that it can be used on the Web. The set of rules for exchanging files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. Similar to the TCP/IP suite of protocols (the basis for information exchange on the Internet), HTTP is an application protocol. A variation of HTTP that is enhanced by a security mechanism, which is usually Secure Sockets Layer (SSL). An unusual configuration with routers that maintain the complete state of the TCP/IP connections or examine the traffic to try to detect and prevent attack (this may involve the bastion host). If very complicated, it is difficult to attach, and difficult to maintain and audit. A dime-size hardware device that stores the private key portion of the Network Security signature certificate to safeguard the private key against being stolen or compromised. The iButton also confirms the identity of a Network Security node. A graphic representation of a container, document, network object, or other data that users can open or manipulate in an application. A status that indicates that a program, job, policy, or scan is not currently running. For example, when a scheduled scan is waiting for the specified date and time to execute, it is inactive. A security occurrence that requires closure. Incidents are derived from an event or a group of events that are generated by a security point product. When a sensor detects a suspicious event, it correlates the event to an incident containing similar or related events. Multiple related events that indicate a possible attack are categorized as incidents. Incidents derive their names from the highest priority event type that is correlated to the incident. A generic grouping that indicates key aspects of an incident based on attributes of related vulnerabilities. Denial of service (DoS) and root compromise are examples of such groupings. To prepare for use. In communications, to set a modem and software parameters at the start of a session. A method of connecting to the network that makes the device an integral part of the network traffic path or route. The place where typed text or a dragged or pasted selection appears. An attack originating from inside a protected network.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

348
Glossary
host-based security
The technique of securing an individual system from attack. Host-based security is
operating system-dependent and version-dependent.
HTML (Hypertext
Markup Language)
A standard set of commands used to structure documents and format text so that it can be
used on the Web.
HTTP (Hypertext
Transfer Protocol)
The set of rules for exchanging files (text, graphic images, sound, video, and other
multimedia files) on the World Wide Web. Similar to the TCP/IP suite of protocols (the
basis for information exchange on the Internet), HTTP is an application protocol.
HTTPS (Hypertext
Transfer Protocol
Secure)
A variation of HTTP that is enhanced by a security mechanism, which is usually Secure
Sockets Layer (SSL).
hybrid gateway
An unusual configuration with routers that maintain the complete state of the TCP/IP
connections or examine the traffic to try to detect and prevent attack (this may involve the
bastion host). If very complicated, it is difficult to attach, and difficult to maintain and
audit.
i
Button
A dime-size hardware device that stores the private key portion of the Network Security
signature certificate to safeguard the private key against being stolen or compromised.
The iButton also confirms the identity of a Network Security node.
icon
A graphic representation of a container, document, network object, or other data that
users can open or manipulate in an application.
inactive
A status that indicates that a program, job, policy, or scan is not currently running. For
example, when a scheduled scan is waiting for the specified date and time to execute, it is
inactive.
incident
A security occurrence that requires closure. Incidents are derived from an event or a group
of events that are generated by a security point product. When a sensor detects a
suspicious event, it correlates the event to an incident containing similar or related
events. Multiple related events that indicate a possible attack are categorized as incidents.
Incidents derive their names from the highest priority event type that is correlated to the
incident.
incident type
A generic grouping that indicates key aspects of an incident based on attributes of related
vulnerabilities. Denial of service (DoS) and root compromise are examples of such
groupings.
initialize
To prepare for use. In communications, to set a modem and software parameters at the
start of a session.
in-line
A method of connecting to the network that makes the device an integral part of the
network traffic path or route.
insertion point
The place where typed text or a dragged or pasted selection appears.
insider attack
An attack originating from inside a protected network.