Symantec 10521146 Administration Guide - Page 354

PGP Pretty Good, PAP Password

Page 354 highlights

354 Glossary packet filter A filter that keeps out certain data packets based on their source and destination addresses and service types. You can use packet filters to block connections from or to specific hosts, networks, or ports. Packet filters are simple and fast, but they make decisions based on a very limited amount of information. packet filtering A firewall technique that examines the headers of packets requesting connection to a computer behind the firewall and either grants or denies permission to connect based on information held within the packet header according to a set of preestablished rules. packet sniffing The interception of packets of information (for example, a credit card number) that are traveling across a network. PAD See Protocol Anomaly Detection. PAP (Password Authentication Protocol) A procedure used to validate a connection request. After the link is established, the requester sends a password and an ID to the server. The server either validates the request and sends back an acknowledgement, terminates the connection, or offers the requester another chance. parallel port A port that transmits synchronous, high-speed flow of data along parallel lines. Parallel ports are usually used for printers. parameter A value that is assigned to a variable. In communications, a parameter is a means of customizing program (software) and hardware operation. passphrase A unique string of characters that a user types as an identification code to restrict access to computers and sensitive files. The system compares the code against a stored list of authorized passwords and users. If the code is legitimate, the system allows access at the security level approved for the owner of the password. password-based attack An attack in which repetitive attempts are made to duplicate a valid logon or password sequence. patch A type of programming code that is used to repair an identified software bug or vulnerability or mitigates a vulnerability by resolving the underlying implementation error. payload The part of the packet, message, or code that carries the data. In information security, payload generally refers to the part of malicious code that performs the destructive operation. permissions A set of rights of a user determining the level of access to Symantec Network Security components and functions. Permissions are granted through assignment of predefined accounts to Users. See user account. PGP (Pretty Good Privacy) A freeware (for non-commercial users) encryption program that uses the public key approach: messages are encrypted using the publicly available key, but the intended recipient can only decipher them via the private key. PGP is perhaps the most widely used encryption program.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

354
Glossary
packet filter
A filter that keeps out certain data packets based on their source and destination
addresses and service types. You can use packet filters to block connections from or to
specific hosts, networks, or ports. Packet filters are simple and fast, but they make
decisions based on a very limited amount of information.
packet filtering
A firewall technique that examines the headers of packets requesting connection to a
computer behind the firewall and either grants or denies permission to connect based on
information held within the packet header according to a set of preestablished rules.
packet sniffing
The interception of packets of information (for example, a credit card number) that are
traveling across a network.
PAD
See
Protocol Anomaly Detection
.
PAP (Password
Authentication
Protocol)
A procedure used to validate a connection request. After the link is established, the
requester sends a password and an ID to the server. The server either validates the request
and sends back an acknowledgement, terminates the connection, or offers the requester
another chance.
parallel port
A port that transmits synchronous, high-speed flow of data along parallel lines. Parallel
ports are usually used for printers.
parameter
A value that is assigned to a variable. In communications, a parameter is a means of
customizing program (software) and hardware operation.
passphrase
A unique string of characters that a user types as an identification code to restrict access
to computers and sensitive files. The system compares the code against a stored list of
authorized passwords and users. If the code is legitimate, the system allows access at the
security level approved for the owner of the password.
password-based attack
An attack in which repetitive attempts are made to duplicate a valid logon or password
sequence.
patch
A type of programming code that is used to repair an identified software bug or
vulnerability or mitigates a vulnerability by resolving the underlying implementation
error.
payload
The part of the packet, message, or code that carries the data. In information security,
payload generally refers to the part of malicious code that performs the destructive
operation.
permissions
A set of rights of a user determining the level of access to Symantec Network Security
components and functions. Permissions are granted through assignment of predefined
accounts to Users. See
user account
.
PGP (Pretty Good
Privacy)
A freeware (for non-commercial users) encryption program that uses the public key
approach: messages are encrypted using the publicly available key, but the intended
recipient can only decipher them via the private key. PGP is perhaps the most widely used
encryption program.