Symantec 10521146 Administration Guide - Page 349

IP Internet Protocol, intrusion management

Page 349 highlights

Glossary 349 intelligence The continual analysis of threats, vulnerabilities, and system and network environments to better provide information, as opposed to data, which aids in the protection of system and network environments. interface group A collection of multiple monitoring interfaces on a Symantec Network Security 7100 Series appliance sharing one sensor process which correlates all network traffic as if it were seen by a single interface. interface pair Two monitoring interfaces which are configured together using in-line mode. One of the pair connects to the inside network, and the other connects to the outside network. interface, monitoring A designated port (also called copy port or mirror port) that creates a copy of the traffic flow on a specific network device. The monitor interface sends this data to Symantec Network Security to examine out-of-band so there is no loss of network functionality. internal threat A threat that originates within an organization. Internet A web of different, intercommunicating networks funded by both commercial and government organizations. It connects networks in many countries. No one owns or runs the Internet. There are thousands of enterprise networks connected to the Internet, and there are millions of users, with thousands more joining every day. intrusion detection A security service that monitors and analyzes system events for the purpose of finding and providing real-time, or near real-time, warning of attempts to access system resources in an unauthorized manner. intrusion management The centralized management of intrusion-based security technologies to identify, manage, and mitigate network intrusions based on security policy. IP (Internet Protocol) The method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one address that uniquely identifies it to all other computers on the Internet. IP address A unique number that identifies a workstation on a TCP/IP network and specifies routing information. Each workstation on a network must be assigned a unique IP address, which consists of the network ID, plus a unique host ID assigned by the network administrator. This address is usually represented in dot-decimal notation, with the decimal values separated by a period (for example 123.45.6.24). IP hijacking An attack in which an active, established session is intercepted and taken over by the attacker. This attack may take place after authentication has occurred, which allows the attacker to assume the role of an already authorized user. IP spoofing An attack in which someone intercepts and co-opts an active, established session. IP spoofing is also an attack method by which IP packets are sent with a false source address, which may try to circumvent firewalls by adopting the IP address of a trusted source. This fools the firewall into thinking that the packets from the hacker are actually from a trusted source. IP spoofing can also be used simply to hide the true origin of an attack.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

349
Glossary
intelligence
The continual analysis of threats, vulnerabilities, and system and network environments
to better provide information, as opposed to data, which aids in the protection of system
and network environments.
interface group
A collection of multiple monitoring interfaces on a Symantec Network Security 7100
Series appliance sharing one sensor process which correlates all network traffic as if it
were seen by a single interface.
interface pair
Two monitoring interfaces which are configured together using in-line mode. One of the
pair connects to the inside network, and the other connects to the outside network.
interface, monitoring
A designated port (also called copy port or mirror port) that creates a copy of the traffic
flow on a specific network device. The monitor interface sends this data to Symantec
Network Security to examine out-of-band so there is no loss of network functionality.
internal threat
A threat that originates within an organization.
Internet
A web of different, intercommunicating networks funded by both commercial and
government organizations. It connects networks in many countries. No one owns or runs
the Internet. There are thousands of enterprise networks connected to the Internet, and
there are millions of users, with thousands more joining every day.
intrusion detection
A security service that monitors and analyzes system events for the purpose of finding
and providing real-time, or near real-time, warning of attempts to access system resources
in an unauthorized manner.
intrusion management
The centralized management of intrusion-based security technologies to identify,
manage, and mitigate network intrusions based on security policy.
IP (Internet Protocol)
The method or protocol by which data is sent from one computer to another on the
Internet. Each computer (known as a host) on the Internet has at least one address that
uniquely identifies it to all other computers on the Internet.
IP address
A unique number that identifies a workstation on a TCP/IP network and specifies routing
information. Each workstation on a network must be assigned a unique IP address, which
consists of the network ID, plus a unique host ID assigned by the network administrator.
This address is usually represented in dot-decimal notation, with the decimal values
separated by a period (for example 123.45.6.24).
IP hijacking
An attack in which an active, established session is intercepted and taken over by the
attacker. This attack may take place after authentication has occurred, which allows the
attacker to assume the role of an already authorized user.
IP spoofing
An attack in which someone intercepts and co-opts an active, established session. IP
spoofing is also an attack method by which IP packets are sent with a false source address,
which may try to circumvent firewalls by adopting the IP address of a trusted source. This
fools the firewall into thinking that the packets from the hacker are actually from a
trusted source. IP spoofing can also be used simply to hide the true origin of an attack.