Symantec 10521146 Administration Guide - Page 361

Formerly called MSAs, the Symantec Network Security Smart Agents are a translation

Page 361 highlights

Glossary 361 SuperUser An individual with an account that is configured to perform all tasks. During installation of the master node, an account is created for a SuperUser with full permissions. This group and the respective set of permissions is predefined, and cannot be modified. Symantec Network Security Smart Agents Formerly called MSAs, the Symantec Network Security Smart Agents are a translation software that enable Symantec Network Security to receive event data from external sensors and correlate that data with all other events. symmetric encryption An encryption method involving a single secret key for both encryption and decryption. The sender of the encrypted message must give that key to the recipient before the recipient can decrypt it. Although this method of encryption is efficient, there is a danger that if the secret key is intercepted, the message can be read by an unintended audience. SYN flood A type of attack in which a system is bombarded with bogus TCP/IP SYN (synchronous idle) requests. When a session is initiated between the Transmission Control Program (TCP) client and server in a network, a very small buffer space exists to handle the handshaking or exchange of messages that sets up the session. The session establishing includes a SYN field that identifies the sequence in the message exchange. An attacker can send a number of connection requests very rapidly and then fail to respond to the reply. This leaves the first packet in the buffer so that other, legitimate connection requests can't be accommodated. Although the packet in the buffer is dropped after a certain period of time without a reply, the effect of many of these bogus connection requests is to make it difficult for legitimate requests for a session to get established. In general, this problem depends on the operating system providing correct settings or allowing the network administrator to tune the size of the buffer and the time-out period. synchronize To copy files between two directories on host and remote computers to make the directories identical to one another. synchronous transmission A form of data transmission in which information is sent in blocks of bits separated by equal time intervals. The sending and receiving devices must first be set to interact with one another at precise intervals, then data is sent in a steady stream. See also asynchronous transmission. syntax error An error made by an author when creating a script, for example, not enclosing a string in quotes or specifying the wrong number of parameters. syslog A Unix operating system logging capability to log to a remote server. system A set of related elements that work together to accomplish a task or provide a service. For example, a computer system includes both hardware and software. TCP/IP (Transmission Control Protocol/Internet Protocol) The suite of protocols that allows different computer platforms using different operating systems (such as Windows, MacOS, or UNIX) or different software applications to communicate. Although TCP and IP are two distinct protocols, the term TCP/IP includes Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), and many others.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

361
Glossary
SuperUser
An individual with an account that is configured to perform all tasks. During installation
of the master node, an account is created for a SuperUser with full permissions. This
group and the respective set of permissions is predefined, and cannot be modified.
Symantec Network
Security Smart Agent
s
Formerly called MSAs, the Symantec Network Security Smart Agents are a translation
software that enable Symantec Network Security to receive event data from external
sensors and correlate that data with all other events.
symmetric encryption
An encryption method involving a single secret key for both encryption and decryption.
The sender of the encrypted message must give that key to the recipient before the
recipient can decrypt it. Although this method of encryption is efficient, there is a danger
that if the secret key is intercepted, the message can be read by an unintended audience.
SYN flood
A type of attack in which a system is bombarded with bogus TCP/IP SYN (synchronous
idle) requests. When a session is initiated between the Transmission Control Program
(TCP) client and server in a network, a very small buffer space exists to handle the
handshaking or exchange of messages that sets up the session. The session establishing
includes a SYN field that identifies the sequence in the message exchange. An attacker can
send a number of connection requests very rapidly and then fail to respond to the reply.
This leaves the first packet in the buffer so that other, legitimate connection requests can’t
be accommodated. Although the packet in the buffer is dropped after a certain period of
time without a reply, the effect of many of these bogus connection requests is to make it
difficult for legitimate requests for a session to get established. In general, this problem
depends on the operating system providing correct settings or allowing the network
administrator to tune the size of the buffer and the time-out period.
synchronize
To copy files between two directories on host and remote computers to make the
directories identical to one another.
synchronous
transmission
A form of data transmission in which information is sent in blocks of bits separated by
equal time intervals. The sending and receiving devices must first be set to interact with
one another at precise intervals, then data is sent in a steady stream. See also
asynchronous transmission
.
syntax error
An error made by an author when creating a script, for example, not enclosing a string in
quotes or specifying the wrong number of parameters.
syslog
A Unix operating system logging capability to log to a remote server.
system
A set of related elements that work together to accomplish a task or provide a service. For
example, a computer system includes both hardware and software.
TCP/IP (Transmission
Control
Protocol/Internet
Protocol)
The suite of protocols that allows different computer platforms using different operating
systems (such as Windows, MacOS, or UNIX) or different software applications to
communicate. Although TCP and IP are two distinct protocols, the term TCP/IP includes
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer
Protocol (SMTP), Post Office Protocol (POP), and many others.