Symantec 10521146 Administration Guide - Page 360

SSL Secure Sockets, SSH Secure Shell - 360

Page 360 highlights

360 Glossary SOCKS A security package that allows a host behind a firewall to use finger, FTP, telnet, Gopher, and Mosaic to access resources outside the firewall while maintaining the security requirements. software The instructions for the computer to perform a particular task. A series of instructions that performs a particular task is called a program. Software instructs the hardware of the computer how to handle data in order to perform a specific task. source-route attack A form of spoofing in which the routing, as indicated in the source routed packet, is not coming from a trusted source and therefore the packet is being routed illicitly. SPI (Security Parameter An Authentication Header (AH) SPI number between 1 and 65535 that you assign to each Index) tunnel endpoint when using AH in a VPN policy. spoofing The act of establishing a connection with a forged sender address. This normally involves exploiting a trust relationship that exists between source and destination addresses or systems. spyware Stand-alone programs that can secretly monitor system activity and detect passwords and other confidential information and relay the information back to another computer. SSH (Secure Shell) A program that allows a user to log on to another computer securely over a network by using encryption. SSH prevents third parties from intercepting or otherwise gaining access to information sent over the network. SSL (Secure Sockets Layer) A protocol that allows mutual authentication between a client and server and the establishment of an authenticated and encrypted connection, thus ensuring the secure transmission of information over the Internet. StandardUser An individual with an account that is configured to perform a specific set of tasks, such as view reports, receive alerts, and add or delete objects. This group and the respective set of permissions is predefined, and cannot be modified. state The last known status, or current status of an application or a process. stateful Of, or pertaining to, a computer or computer program that is designed to note and remember one or more preceding events in a given sequence of interactions with a user, another computer or program, a device, or other outside element. Stateful means that the computer or program keeps track of the state of interaction, usually by setting values in a storage field designated for that purpose. Stateless does not. STOP (Stack Overflow Protection) A simple and transparent protection approach that renders stack or buffer overflow attacks unsuccessful. Stack or buffer overflow attacks continue to be a favorite technique used by hackers to break into servers. STOP reallocates the location of the system stack (the area to which the attacker is trying to have the data overflow). This is like reshuffling the cards in a deck, making it very difficult for the attacker to predict the location for the overflow data. sub-cluster See group.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

360
Glossary
SOCKS
A security package that allows a host behind a firewall to use finger, FTP, telnet, Gopher,
and Mosaic to access resources outside the firewall while maintaining the security
requirements.
software
The instructions for the computer to perform a particular task. A series of instructions
that performs a particular task is called a program. Software instructs the hardware of the
computer how to handle data in order to perform a specific task.
source-route attack
A form of spoofing in which the routing, as indicated in the source routed packet, is not
coming from a trusted source and therefore the packet is being routed illicitly.
SPI (Security Parameter
Index)
An Authentication Header (AH) SPI number between 1 and 65535 that you assign to each
tunnel endpoint when using AH in a VPN policy.
spoofing
The act of establishing a connection with a forged sender address. This normally involves
exploiting a trust relationship that exists between source and destination addresses or
systems.
spyware
Stand-alone programs that can secretly monitor system activity and detect passwords and
other confidential information and relay the information back to another computer.
SSH (Secure Shell)
A program that allows a user to log on to another computer securely over a network by
using encryption. SSH prevents third parties from intercepting or otherwise gaining
access to information sent over the network.
SSL (Secure Sockets
Layer)
A protocol that allows mutual authentication between a client and server and the
establishment of an authenticated and encrypted connection, thus ensuring the secure
transmission of information over the Internet.
StandardUser
An individual with an account that is configured to perform a specific set of tasks, such as
view reports, receive alerts, and add or delete objects. This group and the respective set of
permissions is predefined, and cannot be modified.
state
The last known status, or current status of an application or a process.
stateful
Of, or pertaining to, a computer or computer program that is designed to note and
remember one or more preceding events in a given sequence of interactions with a user,
another computer or program, a device, or other outside element. Stateful means that the
computer or program keeps track of the state of interaction, usually by setting values in a
storage field designated for that purpose. Stateless does not.
STOP (Stack Overflow
Protection)
A simple and transparent protection approach that renders stack or buffer overflow
attacks unsuccessful. Stack or buffer overflow attacks continue to be a favorite technique
used by hackers to break into servers. STOP reallocates the location of the system stack
(the area to which the attacker is trying to have the data overflow). This is like reshuffling
the cards in a deck, making it very difficult for the attacker to predict the location for the
overflow data.
sub-cluster
See
group
.