Symantec 10521146 Administration Guide - Page 362
SuperUser, Administrator, iButton, threat, blended
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 362 highlights
362 Glossary Telnet text field thin client threat threat assessment threat, blended threshold time-out title bar token token ring toolbar tracking trackware trapdoor The main Internet protocol for creating an interactive control connection with a remote computer. Telnet is the most common way of allowing users a remote connection to a network, as with telecommuters or remote workers. The area in which a user can type text. A low-cost computing device that works in a server-centric computing model. Thin clients typically do not require state-of-the-art, powerful processors and large amounts of RAM and ROM because they access applications from a central server or network. Thin clients can operate in a server-based computing environment. A circumstance, event, or person with the potential to cause harm to a system in the form of destruction, disclosure, modification of data, and/or denial of service. The identification and quantification of human threats to an organization or its systems. An attack that uses multiple methods to transmit and spread. The damage caused by blended threats can be rapid and widespread. Protection from blended threats requires multiple layers of defense and response mechanisms. The number of events that satisfy certain criteria. SuperUsers and Administrators define threshold rules to determine how notifications are to be delivered. A predetermined period of time during which a given task must be completed. If the time-out value is reached before or during the execution of a task, the task is cancelled. The area at the top of a window showing the name of the program, function, document, or application. An authentication tool or a device used to send and receive challenges and responses during the user authentication process. Tokens can be small, handheld hardware devices similar to pocket calculators or credit cards. See also iButton. A type of computer network in which all of the computers are arranged schematically in a circle. A token, which is a special bit pattern, travels around the circle. To send a message, a computer catches the token, attaches a message to it, and then lets it continue traveling around the network. The various rows below the menu bar containing buttons for a commonly used subset of the commands that are available in the menus. The logging of inbound and outbound messages based on a predefined criteria. Logging is usually done to allow for further analysis of the data at a future date or time. Stand-alone or appended applications that trace a user's path on the Internet and send information to the target computer. For example, a user could download an application from a Web site or an email or instant messenger attachment. That attachment can then obtain confidential information regarding user behavior. A secret entry point into a computer program that illegitimate users can use to get around authentication and validation methods that are intended to prevent unauthorized entry.