Symantec 10521146 Administration Guide - Page 357

RAM Random Access, Information Protocol

Page 357 highlights

Glossary 357 RAM (Random Access Memory) The memory that information required by currently running programs is kept in, including the program itself. Random access refers to the fact that it can be either read from or written to by any program. Many operating systems protect critical, occupied, or reserved RAM locations from tampering. real-time An immediate action in response to an event, incident, or alert. record To capture and store a set of data that consists of a series of actions and events. redundancy See watchdog process. remote access The use of programs that allow access over the Internet from another computer to gain information or to attack or alter your computer. replication The process of duplicating data from one database to another. report A set of data that is collected by Symantec Network Security that allows all types of data to be selectively examined, scheduled, exported, or printed. reset An action that clears any changes made since the last apply or reset action. reset interface An interface on a Symantec Network Security 7100 Series appliance through which TCP resets are sent to stop a malicious TCP/IP flow. response action A predefined reaction to an event or alert to a defined security threat, such as capturing the attacker's section, triggering tracking, or emailing an alert. Response actions can be configured for each type of incident that is handled by Symantec Network Security. response policy A collection of response rules to react to incidents and events. response rule The method of action for handling security risks that is selected from alternatives, given specific conditions to guide and determine present and future decisions. A logical statement that lets you respond to an event based on predetermined criteria. RestrictedUser An individual with an account that is configured to perform a restricted set of tasks, such as view reports, and receive alerts. This group and the respective set of permissions is predefined, and cannot be modified. rights See permissions. RIP (Routing Information Protocol) The oldest routing protocol on the Internet and the most commonly used routing protocol on local area IP networks. Routers use RIP to periodically broadcast the networks that they know how to reach. risk The anticipated adverse impact that can result if a threat exploits a vulnerability in an asset. rogue program Any program intended to damage programs or data (such as malicious Trojan horses). role An administrative position that is defined by a set of permissions.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

357
Glossary
RAM (Random Access
Memory)
The memory that information required by currently running programs is kept in,
including the program itself. Random access refers to the fact that it can be either read
from or written to by any program. Many operating systems protect critical, occupied, or
reserved RAM locations from tampering.
real-time
An immediate action in response to an event, incident, or alert.
record
To capture and store a set of data that consists of a series of actions and events.
redundancy
See
watchdog process
.
remote access
The use of programs that allow access over the Internet from another computer to gain
information or to attack or alter your computer.
replication
The process of duplicating data from one database to another.
report
A set of data that is collected by Symantec Network Security that allows all types of data to
be selectively examined, scheduled, exported, or printed.
reset
An action that clears any changes made since the last apply or reset action.
reset interface
An interface on a Symantec Network Security 7100 Series appliance through which TCP
resets are sent to stop a malicious TCP/IP flow.
response action
A predefined reaction to an event or alert to a defined security threat, such as capturing
the attackerĀ°s section, triggering tracking, or emailing an alert. Response actions can be
configured for each type of incident that is handled by Symantec Network Security.
response policy
A collection of response rules to react to incidents and events.
response rule
The method of action for handling security risks that is selected from alternatives, given
specific conditions to guide and determine present and future decisions. A logical
statement that lets you respond to an event based on predetermined criteria.
RestrictedUser
An individual with an account that is configured to perform a restricted set of tasks, such
as view reports, and receive alerts. This group and the respective set of permissions is
predefined, and cannot be modified.
rights
See
permissions
.
RIP (Routing
Information Protocol)
The oldest routing protocol on the Internet and the most commonly used routing protocol
on local area IP networks. Routers use RIP to periodically broadcast the networks that they
know how to reach.
risk
The anticipated adverse impact that can result if a threat exploits a vulnerability in an
asset.
rogue program
Any program intended to damage programs or data (such as malicious Trojan horses).
role
An administrative position that is defined by a set of permissions.