Symantec 10521146 Administration Guide - Page 365

WAP Wireless, Application Protocol

Page 365 highlights

Glossary 365 VPN (virtual private network) A network that has characteristics of a private network such as a LAN, but which is built on a public network such as the Internet. VPNs allow organizations to implement private networks between geographically separate offices and remote or mobile employees by means of encryption and tunneling protocols. vulnerability A design, administrative, or implementation weakness or flaw in hardware, firmware, or software. If exploited, it could lead to an unacceptable impact in the form of unauthorized access to information or disruption of critical processing. A weakness or flaw that lets a human threat exploit or compromise a network or system. WAP (Wireless An open global standard for communications between a mobile handset and the Internet Application Protocol) or other computer applications as defined by the WAP forum. warning A message that informs the user that performing an action can or will result in data loss on the user's system. watchdog process A strategy for supporting failover, high availability, and redundancy. The watchdog process deploys a group of Network Security nodes in a hierarchical group so that one is active and the remaining are standby. If the active node fails, a standby node takes its place so that the transition is seamless. Web attack An attack from the outside that is aimed at Web server vulnerabilities. Web denial of service A denial of service attack that specifically targets a Web server. wildcard character A symbol that enables multiple matching values to be returned based on a shared feature. worm A special type of virus. A worm does not attach itself to other programs like a traditional virus, but creates copies of itself, which create even more copies. wrap A program's ability to continue displaying information on a new line or page when the end of a line or page is reached. WWW (World Wide Web) An application on the Internet that allows for the exchange of documents formatted in Hypertext Markup Language (HTML), which facilitates text, graphics, and layout. The World Wide Web is also a system of Internet servers that support specially formatted documents. X.509 The most widely used standard for defining digital certificates. X.509 is actually an ITU Recommendation, which means that it has not yet been officially defined or approved. zero-day detection The ability to detect newly emerging, previously unknown, variant, and/or polymorphic exploits as they occur, without requiring prior exposure or signatures. zombie A computer that is used by hackers to attack the computers that they are targeting for denial of service. The legitimate user of the zombie may not be aware that the computer has been controlled by the hacker; however, if the computer is used to launch a damaging attack, the legitimate user may be investigated or held legally responsible.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

365
Glossary
VPN (virtual private
network)
A network that has characteristics of a private network such as a LAN, but which is built
on a public network such as the Internet. VPNs allow organizations to implement private
networks between geographically separate offices and remote or mobile employees by
means of encryption and tunneling protocols.
vulnerability
A design, administrative, or implementation weakness or flaw in hardware, firmware, or
software. If exploited, it could lead to an unacceptable impact in the form of unauthorized
access to information or disruption of critical processing. A weakness or flaw that lets a
human threat exploit or compromise a network or system.
WAP (Wireless
Application Protocol)
An open global standard for communications between a mobile handset and the Internet
or other computer applications as defined by the WAP forum.
warning
A message that informs the user that performing an action can or will result in data loss
on the user’s system.
watchdog process
A strategy for supporting failover, high availability, and redundancy. The watchdog
process deploys a group of Network Security nodes in a hierarchical group so that one is
active and the remaining are standby. If the active node fails, a standby node takes its
place so that the transition is seamless.
Web attack
An attack from the outside that is aimed at Web server vulnerabilities.
Web denial of service
A denial of service attack that specifically targets a Web server.
wildcard character
A symbol that enables multiple matching values to be returned based on a shared feature.
worm
A special type of virus. A worm does not attach itself to other programs like a traditional
virus, but creates copies of itself, which create even more copies.
wrap
A program’s ability to continue displaying information on a new line or page when the end
of a line or page is reached.
WWW (World Wide Web)
An application on the Internet that allows for the exchange of documents formatted in
Hypertext Markup Language (HTML), which facilitates text, graphics, and layout. The
World Wide Web is also a system of Internet servers that support specially formatted
documents.
X.509
The most widely used standard for defining digital certificates. X.509 is actually an ITU
Recommendation, which means that it has not yet been officially defined or approved.
zero-day detection
The ability to detect newly emerging, previously unknown, variant, and/or polymorphic
exploits as they occur, without requiring prior exposure or signatures.
zombie
A computer that is used by hackers to attack the computers that they are targeting for
denial of service. The legitimate user of the zombie may not be aware that the computer
has been controlled by the hacker; however, if the computer is used to launch a damaging
attack, the legitimate user may be investigated or held legally responsible.