Symantec 10521146 Administration Guide - Page 358

Secure/Multipurpose, Internet Mail

Page 358 highlights

358 Glossary role-based administration A method of administration in which access rights or permissions are granted to user roles in hierarchical responsibilities. The set of permissions define the administrative or user positions. ROM (read-only memory) The memory that is stored on the hard drive of the computer. Its contents cannot be accessed or modified by the computer user, but can only be read. router A device that helps local area networks (LANs) and wide area networks (WANs) achieve interoperability and connectivity. rule A logical statement that lets you respond to an event based on predetermined criteria. run To execute a program or script. S/MIME (Secure/Multipurpose Internet Mail Extensions) An email security protocol that was designed to prevent the interception and forgery of email by using encryption and digital signatures. S/MIME builds security on top of the MIME protocol and is based on technology originally developed by RSA Data Security, Inc. safeguard The control or countermeasure employed to reduce the risk associated with a specific threat or group of threats. Examples of safeguards are patches, policies, deterrence measures, surveillance, physical security, upgrades, education, and training. script A type of program that consists of a set of instructions for an application. A script usually consists of instructions that are expressed using the application's rules and syntax, combined with simple control structures. script kiddie An unskilled cracker who uses code and software (or scripts) downloaded from the Internet to inflict damage on targeted sites. Often these destructive activities are carried out for no other purpose than to prove the script kiddie's hacking prowess. secure browser A Web browser that can use a secure protocol, such as SSL, to establish a secure connection to a Web server. security The policies, practices, and procedures that are applied to information systems to ensure that the data and information that is held within or communicated along those systems is not vulnerable to inappropriate or unauthorized use, access, or modification and that the networks that are used to store, process, or transmit information are kept operational and secure against unauthorized access. As the Internet becomes a more fundamental part of doing business, computer and information security are assuming more importance in corporate planning and policy. sensor process The functionality of Network Security sensors to perform detection, analysis and take responsive action against perceived attacks. serial port A location for sending and receiving serial data transmissions. Also known as a communications port or COM port. DOS references these ports by the names COM1, COM2, COM3, and COM4. server A computer or software that provides services to other computers (known as clients) that request specific services. Common examples are Web servers and mail servers.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

358
Glossary
role-based
administration
A method of administration in which access rights or permissions are granted to user
roles in hierarchical responsibilities. The set of permissions define the administrative or
user positions.
ROM (read-only
memory)
The memory that is stored on the hard drive of the computer. Its contents cannot be
accessed or modified by the computer user, but can only be read.
router
A device that helps local area networks (LANs) and wide area networks (WANs) achieve
interoperability and connectivity.
rule
A logical statement that lets you respond to an event based on predetermined criteria.
run
To execute a program or script.
S/MIME
(Secure/Multipurpose
Internet Mail
Extensions)
An email security protocol that was designed to prevent the interception and forgery of
email by using encryption and digital signatures. S/MIME builds security on top of the
MIME protocol and is based on technology originally developed by RSA Data Security, Inc.
safeguard
The control or countermeasure employed to reduce the risk associated with a specific
threat or group of threats. Examples of safeguards are patches, policies, deterrence
measures, surveillance, physical security, upgrades, education, and training.
script
A type of program that consists of a set of instructions for an application. A script usually
consists of instructions that are expressed using the application’s rules and syntax,
combined with simple control structures.
script kiddie
An unskilled cracker who uses code and software (or scripts) downloaded from the
Internet to inflict damage on targeted sites. Often these destructive activities are carried
out for no other purpose than to prove the script kiddie’s hacking prowess.
secure browser
A Web browser that can use a secure protocol, such as SSL, to establish a secure
connection to a Web server.
security
The policies, practices, and procedures that are applied to information systems to ensure
that the data and information that is held within or communicated along those systems is
not vulnerable to inappropriate or unauthorized use, access, or modification and that the
networks that are used to store, process, or transmit information are kept operational and
secure against unauthorized access. As the Internet becomes a more fundamental part of
doing business, computer and information security are assuming more importance in
corporate planning and policy.
sensor process
The functionality of Network Security sensors to perform detection, analysis and take
responsive action against perceived attacks.
serial port
A location for sending and receiving serial data transmissions. Also known as a
communications port or COM port. DOS references these ports by the names COM1,
COM2, COM3, and COM4.
server
A computer or software that provides services to other computers (known as clients) that
request specific services. Common examples are Web servers and mail servers.