Symantec 10521146 Administration Guide - Page 351

Media Access Control sublayer of the Data Link Control DLC layer of telecommunication

Page 351 highlights

Glossary 351 MAC (Media Access Control) malicious code malware manipulation menu bar MIB (Management Information Base) middleware MIME (Multipurpose Internet Mail Extensions) mirror port mode monitoring monitoring interface MSA multicast multiuser name server On a network, a computer's unique hardware number. The MAC address is used by the Media Access Control sublayer of the Data Link Control (DLC) layer of telecommunication protocols. There is a different MAC sublayer for each physical device type. The data-link layer is the protocol layer in a program that handles the moving of data in and out across a physical link in a network. Programs such as viruses, worms, logic bombs, and Trojan horses that are surreptitiously inserted into programs to destroy data, run destructive or intrusive programs, or otherwise compromise the security or integrity of the victim's computer data. Programs and files that are created to do harm. Malware includes computer viruses, worms, and Trojan horses. The insertion of arbitrary streams of data without the user noticing. The horizontal area at the top of a window containing all of the commands appropriate to the selected console view tab. A database of objects that can be monitored by a network management system. Both SNMP and RMON use standardized MIB formats that allow any SNMP and RMON tools to monitor any device defined by an MIB. An application that connects two otherwise separate applications. A protocol used for transmitting documents with different formats via the Internet. See interface, monitoring. A system state in which a single action or a series of actions are performed. A mode has an On condition and an Off condition. For example, in-line mode for interfaces in a Symantec Network Security 7100 Series appliance is On if a security administrator configures those interfaces for in-line mode, and does the proper cabling of the ports. Using in-line mode, the appliance is placed into the network path, and can block malicious traffic. The viewing of activity in a security environment, generally in real-time. Monitoring allows security administrators to view the content of applications that are being used. See interface, monitoring. See Symantec Network Security Smart Agents. To simultaneously send the same message to a select group of recipients on a network, as opposed to broadcasting to all recipients on a network. Sometimes used synonymously as narrowcast. Of, or pertaining to, the ability of multiple, concurrent users to log on and run applications from a single server. A computer running a program that converts domain names into appropriate IP addresses and vice versa.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

351
Glossary
MAC (Media Access
Control)
On a network, a computer’s unique hardware number. The MAC address is used by the
Media Access Control sublayer of the Data Link Control (DLC) layer of telecommunication
protocols. There is a different MAC sublayer for each physical device type. The data-link
layer is the protocol layer in a program that handles the moving of data in and out across a
physical link in a network.
malicious code
Programs such as viruses, worms, logic bombs, and Trojan horses that are surreptitiously
inserted into programs to destroy data, run destructive or intrusive programs, or
otherwise compromise the security or integrity of the victim’s computer data.
malware
Programs and files that are created to do harm. Malware includes computer viruses,
worms, and Trojan horses.
manipulation
The insertion of arbitrary streams of data without the user noticing.
menu bar
The horizontal area at the top of a window containing all of the commands appropriate to
the selected console view tab.
MIB (Management
Information Base)
A database of objects that can be monitored by a network management system. Both
SNMP and RMON use standardized MIB formats that allow any SNMP and RMON tools to
monitor any device defined by an MIB.
middleware
An application that connects two otherwise separate applications.
MIME (Multipurpose
Internet Mail
Extensions)
A protocol used for transmitting documents with different formats via the Internet.
mirror port
See
interface, monitoring
.
mode
A system state in which a single action or a series of actions are performed. A mode has an
On condition and an Off condition. For example,
in-line
mode for interfaces in a Symantec
Network Security 7100 Series appliance is On if a security administrator configures those
interfaces for in-line mode, and does the proper cabling of the ports. Using in-line mode,
the appliance is placed into the network path, and can block malicious traffic.
monitoring
The viewing of activity in a security environment, generally in real-time. Monitoring
allows security administrators to view the content of applications that are being used.
monitoring interface
See
interface, monitoring
.
MSA
See
Symantec Network Security Smart Agents
.
multicast
To simultaneously send the same message to a select group of recipients on a network, as
opposed to broadcasting to all recipients on a network. Sometimes used synonymously as
narrowcast.
multiuser
Of, or pertaining to, the ability of multiple, concurrent users to log on and run applications
from a single server.
name server
A computer running a program that converts domain names into appropriate IP addresses
and vice versa.