Symantec 10521146 Administration Guide - Page 357
RAM Random Access, Information Protocol
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 357 highlights
Glossary 357 RAM (Random Access Memory) The memory that information required by currently running programs is kept in, including the program itself. Random access refers to the fact that it can be either read from or written to by any program. Many operating systems protect critical, occupied, or reserved RAM locations from tampering. real-time An immediate action in response to an event, incident, or alert. record To capture and store a set of data that consists of a series of actions and events. redundancy See watchdog process. remote access The use of programs that allow access over the Internet from another computer to gain information or to attack or alter your computer. replication The process of duplicating data from one database to another. report A set of data that is collected by Symantec Network Security that allows all types of data to be selectively examined, scheduled, exported, or printed. reset An action that clears any changes made since the last apply or reset action. reset interface An interface on a Symantec Network Security 7100 Series appliance through which TCP resets are sent to stop a malicious TCP/IP flow. response action A predefined reaction to an event or alert to a defined security threat, such as capturing the attacker's section, triggering tracking, or emailing an alert. Response actions can be configured for each type of incident that is handled by Symantec Network Security. response policy A collection of response rules to react to incidents and events. response rule The method of action for handling security risks that is selected from alternatives, given specific conditions to guide and determine present and future decisions. A logical statement that lets you respond to an event based on predetermined criteria. RestrictedUser An individual with an account that is configured to perform a restricted set of tasks, such as view reports, and receive alerts. This group and the respective set of permissions is predefined, and cannot be modified. rights See permissions. RIP (Routing Information Protocol) The oldest routing protocol on the Internet and the most commonly used routing protocol on local area IP networks. Routers use RIP to periodically broadcast the networks that they know how to reach. risk The anticipated adverse impact that can result if a threat exploits a vulnerability in an asset. rogue program Any program intended to damage programs or data (such as malicious Trojan horses). role An administrative position that is defined by a set of permissions.