Symantec 10521146 Administration Guide - Page 358
Secure/Multipurpose, Internet Mail
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 358 highlights
358 Glossary role-based administration A method of administration in which access rights or permissions are granted to user roles in hierarchical responsibilities. The set of permissions define the administrative or user positions. ROM (read-only memory) The memory that is stored on the hard drive of the computer. Its contents cannot be accessed or modified by the computer user, but can only be read. router A device that helps local area networks (LANs) and wide area networks (WANs) achieve interoperability and connectivity. rule A logical statement that lets you respond to an event based on predetermined criteria. run To execute a program or script. S/MIME (Secure/Multipurpose Internet Mail Extensions) An email security protocol that was designed to prevent the interception and forgery of email by using encryption and digital signatures. S/MIME builds security on top of the MIME protocol and is based on technology originally developed by RSA Data Security, Inc. safeguard The control or countermeasure employed to reduce the risk associated with a specific threat or group of threats. Examples of safeguards are patches, policies, deterrence measures, surveillance, physical security, upgrades, education, and training. script A type of program that consists of a set of instructions for an application. A script usually consists of instructions that are expressed using the application's rules and syntax, combined with simple control structures. script kiddie An unskilled cracker who uses code and software (or scripts) downloaded from the Internet to inflict damage on targeted sites. Often these destructive activities are carried out for no other purpose than to prove the script kiddie's hacking prowess. secure browser A Web browser that can use a secure protocol, such as SSL, to establish a secure connection to a Web server. security The policies, practices, and procedures that are applied to information systems to ensure that the data and information that is held within or communicated along those systems is not vulnerable to inappropriate or unauthorized use, access, or modification and that the networks that are used to store, process, or transmit information are kept operational and secure against unauthorized access. As the Internet becomes a more fundamental part of doing business, computer and information security are assuming more importance in corporate planning and policy. sensor process The functionality of Network Security sensors to perform detection, analysis and take responsive action against perceived attacks. serial port A location for sending and receiving serial data transmissions. Also known as a communications port or COM port. DOS references these ports by the names COM1, COM2, COM3, and COM4. server A computer or software that provides services to other computers (known as clients) that request specific services. Common examples are Web servers and mail servers.