Symantec 10521146 Administration Guide - Page 365
WAP Wireless, Application Protocol
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 365 highlights
Glossary 365 VPN (virtual private network) A network that has characteristics of a private network such as a LAN, but which is built on a public network such as the Internet. VPNs allow organizations to implement private networks between geographically separate offices and remote or mobile employees by means of encryption and tunneling protocols. vulnerability A design, administrative, or implementation weakness or flaw in hardware, firmware, or software. If exploited, it could lead to an unacceptable impact in the form of unauthorized access to information or disruption of critical processing. A weakness or flaw that lets a human threat exploit or compromise a network or system. WAP (Wireless An open global standard for communications between a mobile handset and the Internet Application Protocol) or other computer applications as defined by the WAP forum. warning A message that informs the user that performing an action can or will result in data loss on the user's system. watchdog process A strategy for supporting failover, high availability, and redundancy. The watchdog process deploys a group of Network Security nodes in a hierarchical group so that one is active and the remaining are standby. If the active node fails, a standby node takes its place so that the transition is seamless. Web attack An attack from the outside that is aimed at Web server vulnerabilities. Web denial of service A denial of service attack that specifically targets a Web server. wildcard character A symbol that enables multiple matching values to be returned based on a shared feature. worm A special type of virus. A worm does not attach itself to other programs like a traditional virus, but creates copies of itself, which create even more copies. wrap A program's ability to continue displaying information on a new line or page when the end of a line or page is reached. WWW (World Wide Web) An application on the Internet that allows for the exchange of documents formatted in Hypertext Markup Language (HTML), which facilitates text, graphics, and layout. The World Wide Web is also a system of Internet servers that support specially formatted documents. X.509 The most widely used standard for defining digital certificates. X.509 is actually an ITU Recommendation, which means that it has not yet been officially defined or approved. zero-day detection The ability to detect newly emerging, previously unknown, variant, and/or polymorphic exploits as they occur, without requiring prior exposure or signatures. zombie A computer that is used by hackers to attack the computers that they are targeting for denial of service. The legitimate user of the zombie may not be aware that the computer has been controlled by the hacker; however, if the computer is used to launch a damaging attack, the legitimate user may be investigated or held legally responsible.