Symantec 10521146 Administration Guide - Page 355

POP3 Post Office, ping Packet Internet

Page 355 highlights

Glossary 355 physical exposure A rating used to calculate vulnerability that is based on whether a threat must have physical access to your system to exploit a vulnerability. PIN (personal In computer security, a number used during the authentication process that is known only identification number) to the user. ping (Packet Internet Groper) A program that security administrators and hackers or crackers use to determine whether a specific computer is currently online and accessible. Pinging works by sending a packet to the specified IP address and waiting for a reply; if a reply is received, the computer is deemed to be online and accessible. platform attack An attack that focuses on vulnerabilities in the operating system that is hosting the firewall. policy 1. A document (hardcopy or electronic) that outlines specific requirements or rules that must be met. 2. The activities or states that are allowed, required, or forbidden within a specific environment. See response policy. policy management The creation, configuration, and monitoring of security assets and information to ensure that they are compliant with policies. POP (Post Office Protocol) A protocol that allows clients to retrieve email from a mail server. POP3 (Post Office Protocol 3) An email protocol used to retrieve email from a remote server over an Internet connection. port 1. A hardware location for passing data into and out of a computing device. Personal computers have various types of ports, including internal ports for connecting disk drives, monitors, and keyboards, and external ports, for connecting modems, printers, mouse devices, and other peripheral devices. 2. In TCP/IP and UDP networks, the name given to an endpoint of a logical connection. Port numbers identify types of ports. For example, both TCP and UDP use port 80 for transporting HTTP data. port scan An intrusion method in which hackers use software tools called port scanners to find services currently running on target systems. This is done by scanning the target for open ports, usually by sending a connection request to each port and waiting for a response. If a response is received, the port is known to be open. PPP (Point-to-Point Protocol) A protocol used for communication between two computers. This is most commonly seen with dial-up accounts to an ISP. However, Point-to-Point Protocol over Ethernet (PPPoE) has now become more popular with many DSL providers. priority A number between 1 and 5 (inclusive) that is assigned to an incident. The number is assigned based on signature attributes, system attributes, organization attributes, and vulnerability attributes.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

355
Glossary
physical exposure
A rating used to calculate vulnerability that is based on whether a threat must have
physical access to your system to exploit a vulnerability.
PIN (personal
identification number)
In computer security, a number used during the authentication process that is known only
to the user.
ping (Packet Internet
Groper)
A program that security administrators and hackers or crackers use to determine whether
a specific computer is currently online and accessible. Pinging works by sending a packet
to the specified IP address and waiting for a reply; if a reply is received, the computer is
deemed to be online and accessible.
platform attack
An attack that focuses on vulnerabilities in the operating system that is hosting the
firewall.
policy
1. A document (hardcopy or electronic) that outlines specific requirements or rules that
must be met. 2. The activities or states that are allowed, required, or forbidden within a
specific environment. See
response policy
.
policy management
The creation, configuration, and monitoring of security assets and information to ensure
that they are compliant with policies.
POP (Post Office
Protocol)
A protocol that allows clients to retrieve email from a mail server.
POP3 (Post Office
Protocol 3)
An email protocol used to retrieve email from a remote server over an Internet connection.
port
1. A hardware location for passing data into and out of a computing device. Personal
computers have various types of ports, including internal ports for connecting disk drives,
monitors, and keyboards, and external ports, for connecting modems, printers, mouse
devices, and other peripheral devices. 2. In TCP/IP and UDP networks, the name given to
an endpoint of a logical connection. Port numbers identify types of ports. For example,
both TCP and UDP use port 80 for transporting HTTP data.
port scan
An intrusion method in which hackers use software tools called port scanners to find
services currently running on target systems. This is done by scanning the target for open
ports, usually by sending a connection request to each port and waiting for a response. If a
response is received, the port is known to be open.
PPP (Point-to-Point
Protocol)
A protocol used for communication between two computers. This is most commonly seen
with dial-up accounts to an ISP. However, Point-to-Point Protocol over Ethernet (PPPoE)
has now become more popular with many DSL providers.
priority
A number between 1 and 5 (inclusive) that is assigned to an incident. The number is
assigned based on signature attributes, system attributes, organization attributes, and
vulnerability attributes.