Symantec 10521146 Administration Guide - Page 363

URL Uniform Resource, UDP User Datagram

Page 363 highlights

Glossary 363 trending The result of monitoring and analyzing data to show a tendency in some direction over time. Trojan horse A rogue program that disguises itself as a legitimate file to lure users to download and run it. It takes the identity of a trusted application to collect confidential user information or avoid detection. A Trojan horse neither replicates nor copies itself, but causes damage and compromises the security of an infected computer. tunnel A process that allows a company to securely use public networks as an alternative to using its own lines for wide-area communications. tunneling router A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network, for eventual de-encapsulation and decryption. two-factor authentication A type of authentication that is based on something a user knows (factor one) plus something the user has (factor two). In order to access a network, the user must have both factors (in the same way that a user must have an ATM card and a personal identification number [PIN] to retrieve money from a bank account). In order to be authenticated during the challenge/response process, the user must have this specific (private) information. UDP (User Datagram Protocol) A connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP provides very few error recovery services, offering instead a direct way to send and receive datagrams over an IP network. UDP is used primarily for broadcasting messages over a network. unstructured threat A threat that tends to be technically unskilled or unsophisticated. upload To send a file from one computer to another via modem, network, or serial cable. With a modem-based communications link, the process generally involves the requesting computer instructing the remote computer to prepare to receive the file on its disk and wait for the transmission to begin. See also download. UPS (uninterruptible power supply) A device that allows your computer and firewall equipment to run for a short time after a power failure. This allows you to power the device down in an orderly manner. A UPS also provides protection in the event of a power surge. URL (Uniform Resource The standard addressing system for the World Wide Web. A URL consists of two parts: The Locator) first part indicates the protocol to use (for example http://), and the second part specifies the IP address or the domain name and the path where the desired information is located (for example www.securityfocus.com/glossary). URL blocking The tracking and denying of user access to undesirable Web sites based on predefined site content. user A person who is enabled to perform Symantec Network Security administrative tasks, such as view reports or receive notifications. See also SuperUser, Administrator, StandardUser, and RestrictedUser.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

363
Glossary
trending
The result of monitoring and analyzing data to show a tendency in some direction over
time.
Trojan horse
A rogue program that disguises itself as a legitimate file to lure users to download and run
it. It takes the identity of a trusted application to collect confidential user information or
avoid detection. A Trojan horse neither replicates nor copies itself, but causes damage and
compromises the security of an infected computer.
tunnel
A process that allows a company to securely use public networks as an alternative to using
its own lines for wide-area communications.
tunneling router
A router or system capable of routing traffic by encrypting it and encapsulating it for
transmission across an untrusted network, for eventual de-encapsulation and decryption.
two-factor
authentication
A type of authentication that is based on something a user knows (factor one) plus
something the user has (factor two). In order to access a network, the user must have both
factors (in the same way that a user must have an ATM card and a personal identification
number [PIN] to retrieve money from a bank account). In order to be authenticated during
the challenge/response process, the user must have this specific (private) information.
UDP (User Datagram
Protocol)
A connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP
provides very few error recovery services, offering instead a direct way to send and receive
datagrams over an IP network. UDP is used primarily for broadcasting messages over a
network.
unstructured threat
A threat that tends to be technically unskilled or unsophisticated.
upload
To send a file from one computer to another via modem, network, or serial cable. With a
modem-based communications link, the process generally involves the requesting
computer instructing the remote computer to prepare to receive the file on its disk and
wait for the transmission to begin. See also
download
.
UPS (uninterruptible
power supply)
A device that allows your computer and firewall equipment to run for a short time after a
power failure. This allows you to power the device down in an orderly manner. A UPS also
provides protection in the event of a power surge.
URL (Uniform Resource
Locator)
The standard addressing system for the World Wide Web. A URL consists of two parts: The
first part indicates the protocol to use (for example http://), and the second part specifies
the IP address or the domain name and the path where the desired information is located
(for example www.securityfocus.com/glossary).
URL blocking
The tracking and denying of user access to undesirable Web sites based on predefined site
content.
user
A person who is enabled to perform Symantec Network Security administrative tasks,
such as view reports or receive notifications. See also
SuperUser
,
Administrator
,
StandardUser
, and
RestrictedUser
.