Symantec 10521146 Administration Guide - Page 356

private key, probe, protocol, Protocol Anomaly, Detection, proxy server, public key

Page 356 highlights

356 Glossary private key A part of asymmetric encryption that uses a private key in conjunction with a public key. The private key is kept secret, while the public key is sent to those with whom a user expects to communicate. The private key is then used to encrypt the data, and the corresponding public key is used to decrypt it. The risk in this system is that if either party loses the key or the key is stolen, the system is broken. probe An effort, such as a request, transaction, or program, that is used to gather information about a computer or the state of a network. For example, sending an empty message to see whether a destination actually exists. Ping is a common utility for sending such a probe. Some probes are inserted near key junctures in a network for the purpose of monitoring or collecting data about network activity. protocol A set of rules for encoding and decoding data so that messages can be exchanged between computers and so that each computer can fully understand the meaning of the messages. On the Internet, the exchange of information between different computers is made possible by the suite of protocols known as TCP/IP. Protocols can be stacked, meaning that one transmission can use two or more protocols. For example, an FTP session uses the FTP protocol to transfer files, the TCP protocol to manage connections, and the IP protocol to deliver data. Protocol Anomaly Detection One of an array of methodologies by which Symantec Network Security inspects network traffic, compares observed behavior during network protocol exchange to structured protocols, analyzes defiant behavior in context, and detects deviations from the norm. proxy server A server that acts on behalf of one or more other servers, usually for screening, firewall, or caching purposes, or a combination of these purposes. Also called a gateway. Typically, a proxy server is used within a company or enterprise to gather all Internet requests, forward them out to Internet servers, and then receive the responses and in turn forward them to the original requester within the company. public key A part of asymmetric encryption that operates in conjunction with the private key. The sender looks up the public key of the intended recipient and uses the public key to encrypt the message. The recipient then uses his or her private key, which is not made public, to decrypt the message. public key cryptography A cryptographic system in which two different keys are used for encryption and decryption. Also called asymmetric cryptography. The sender of the message looks up the public key of the intended recipient and uses the public key to encrypt the message. The recipient then uses his or her private key, which is not made public to decrypt the message. This method of encryption is considered more secure than symmetrical cryptography because one of the keys is kept strictly private. QoS (quality of service) The idea that transmission rates, error rates, and other characteristics on the Internet and in other networks, can be measured, improved, and, to some extent, guaranteed in advance. QoS is of particular concern for the continuous transmission of high-bandwidth video and multimedia information.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

356
Glossary
private key
A part of asymmetric encryption that uses a private key in conjunction with a public key.
The private key is kept secret, while the public key is sent to those with whom a user
expects to communicate. The private key is then used to encrypt the data, and the
corresponding public key is used to decrypt it. The risk in this system is that if either party
loses the key or the key is stolen, the system is broken.
probe
An effort, such as a request, transaction, or program, that is used to gather information
about a computer or the state of a network. For example, sending an empty message to see
whether a destination actually exists. Ping is a common utility for sending such a probe.
Some probes are inserted near key junctures in a network for the purpose of monitoring or
collecting data about network activity.
protocol
A set of rules for encoding and decoding data so that messages can be exchanged between
computers and so that each computer can fully understand the meaning of the messages.
On the Internet, the exchange of information between different computers is made
possible by the suite of protocols known as TCP/IP. Protocols can be stacked, meaning that
one transmission can use two or more protocols. For example, an FTP session uses the FTP
protocol to transfer files, the TCP protocol to manage connections, and the IP protocol to
deliver data.
Protocol Anomaly
Detection
One of an array of methodologies by which Symantec Network Security inspects network
traffic, compares observed behavior during network protocol exchange to structured
protocols, analyzes defiant behavior in context, and detects deviations from the norm.
proxy server
A server that acts on behalf of one or more other servers, usually for screening, firewall, or
caching purposes, or a combination of these purposes. Also called a gateway. Typically, a
proxy server is used within a company or enterprise to gather all Internet requests,
forward them out to Internet servers, and then receive the responses and in turn forward
them to the original requester within the company.
public key
A part of asymmetric encryption that operates in conjunction with the private key. The
sender looks up the public key of the intended recipient and uses the public key to encrypt
the message. The recipient then uses his or her private key, which is not made public, to
decrypt the message.
public key cryptography
A cryptographic system in which two different keys are used for encryption and
decryption. Also called asymmetric cryptography. The sender of the message looks up the
public key of the intended recipient and uses the public key to encrypt the message. The
recipient then uses his or her private key, which is not made public to decrypt the
message. This method of encryption is considered more secure than symmetrical
cryptography because one of the keys is kept strictly private.
QoS (quality of service)
The idea that transmission rates, error rates, and other characteristics on the Internet and
in other networks, can be measured, improved, and, to some extent, guaranteed in
advance. QoS is of particular concern for the continuous transmission of high-bandwidth
video and multimedia information.