Symantec 10521146 Administration Guide - Page 352

NNTP Network News, node, Network Security

Page 352 highlights

352 Glossary near real-time The timely action in response to an event, incident, or alert. network A group of computers and associated devices that are connected by communications facilities (both hardware and software) to share information and peripheral devices such as printers and modems. network tap See interface, monitoring. network worm A program or command file that uses a computer network as a means for adversely affecting a system's integrity, reliability, or availability. A network worm can attack from one system to another by establishing a network connection. It is usually a self-contained program that does not need to attach itself to a host file to infiltrate network after network. NIC See Ethernet interface and gigabit Ethernet interface. NIDS (network-based intrusion detection system) A type of intrusion detection system that works at the network level by monitoring packets on the network and gauging whether a hacker is attempting to sending a large number of connection requests to a computer on the network, indicating an attempt either to break into a system or cause a denial of service attack. Unlike other intrusion detection systems, a NIDS is able to monitor numerous computers at once. NNTP (Network News The predominant protocol used by computers (servers and clients) for managing the notes Transfer Protocol) posted on newsgroups. NNTP replaced the original Usenet protocol, UNIX-to-UNIX. node, active The primary node in a watchdog process or failover group, from which all activity predominates. See also node, standby. node, master A primary Symantec Network Security installation that ranks above all other Network Security nodes in a group or cluster. By default, the first Network Security installation is designated as a master node, and all other Network Security nodes within the cluster are designated as slave nodes. Changes to a master node are propagated to the slave nodes in a cluster. node, network See object. node, Network Security The main component of Symantec Network Security that includes comprehensive detection, analysis, and response functionality. Network Security nodes can be administered via the Network Security console, and can be deployed singly or grouped for cross-node correlation. node, standby The standby node or nodes in a watchdog process or failover group serve as a backup if your active master node fails or is shut down for servicing. node, slave A Symantec Network Security installation that ranks below a master Network Security node in a group or cluster. By default, the first Symantec Network Security installation is designated as a master node, and all other Network Security nodes within the cluster are designated as slave nodes. The slave nodes receive updates to their topology, response policy, and configuration databases from a master Network Security software node in the cluster.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

352
Glossary
near real-time
The timely action in response to an event, incident, or alert.
network
A group of computers and associated devices that are connected by communications
facilities (both hardware and software) to share information and peripheral devices such
as printers and modems.
network tap
See
interface, monitoring
.
network worm
A program or command file that uses a computer network as a means for adversely
affecting a system’s integrity, reliability, or availability. A network worm can attack from
one system to another by establishing a network connection. It is usually a self-contained
program that does not need to attach itself to a host file to infiltrate network after
network.
NIC
See
Ethernet interface
and
gigabit Ethernet interface
.
NIDS (network-based
intrusion detection
system)
A type of intrusion detection system that works at the network level by monitoring
packets on the network and gauging whether a hacker is attempting to sending a large
number of connection requests to a computer on the network, indicating an attempt
either to break into a system or cause a denial of service attack. Unlike other intrusion
detection systems, a NIDS is able to monitor numerous computers at once.
NNTP (Network News
Transfer Protocol)
The predominant protocol used by computers (servers and clients) for managing the notes
posted on newsgroups. NNTP replaced the original Usenet protocol, UNIX-to-UNIX.
node, active
The primary node in a watchdog process or failover group, from which all activity
predominates. See also
node, standby
.
node, master
A primary Symantec Network Security installation that ranks above all other Network
Security nodes in a group or cluster. By default, the first Network Security installation is
designated as a master node, and all other Network Security nodes within the cluster are
designated as slave nodes. Changes to a master node are propagated to the slave nodes in a
cluster.
node, network
See
object
.
node, Network Security
The main component of Symantec Network Security that includes comprehensive
detection, analysis, and response functionality. Network Security
nodes can be
administered via the Network Security console, and can be deployed singly or grouped for
cross-node correlation.
node, standby
The standby node or nodes in a watchdog process or failover group serve as a backup if
your active master node fails or is shut down for servicing.
node, slave
A Symantec Network Security installation that ranks below a master Network Security
node in a group or cluster. By default, the first Symantec Network Security installation is
designated as a master node, and all other Network Security nodes within the cluster are
designated as slave nodes. The slave nodes receive updates to their topology, response
policy, and configuration databases from a master Network Security software node in the
cluster.