346 Glossary
failover
An automated strategy to provide high availability and redundancy by deploying a
standby node to take over if the master node fails or is shut down for servicing. See also
watchdog process
.
false negative
An unrecognized and/or unreported activity or state that requires response, such as a
virus or intrusion that is not detected.
false positive
A reported activity or state that does not require response because it was reported
incorrectly or does not pose a threat. Too many false positives can become intrusive in
themselves.
fault tolerance
A design method that ensures continued systems operation in the event of individual
failures by providing redundant system elements.
FDDI (Fiber Distributed
Data Interface)
A set of ANSI protocols used for sending digital data over fiber optic cable. FDDI networks
are token-passing networks and support data rates of up to 100 Mb (100 million bits) per
second. FDDI networks are typically used as backbones for wide area networks.
file transfer
The process of using communications to send a file from one computer to another. In
communications, a protocol must be agreed upon by sending and receiving computers
before a file transfer can occur.
filter
A program or section of code that is designed to examine each input or output request for
certain qualifying criteria and then process or forward it accordingly. Also a method of
querying a list to produce a subset of items with specified characteristics.
firewall
A program that protects the resources of one network from users from other networks.
Often, an enterprise with an intranet that allows its workers access to the wider Internet
will install a firewall to prevent outsiders from accessing its own private data resources.
firewall denial of
service
A denial of service attack aimed directly at the firewall.
firewall
hardware/software
A physical or virtual boundary to secure a network or network segment. A firewall can
identify and permit or block network traffic based on multiple criteria including
originating domain, network port number, and originating network IP address.
flooding program
A program that contains code that, when executed, will bombard the selected system with
requests in an effort to slow down or shut down the system.
flowcookie
A message in string format that includes details about a particular event, such as IP
addresses, attack details, ports, etc.
follow-up
The final phase of incident response to an incident. All other phases seek the most
efficient path to this phase. Reporting is a key action in this phase.
FQDN (fully qualified
domain name)
A URL that consists of a host and domain name, including top-level domain. For example,
www.symantec.com is a fully qualified domain name. www is the host, symantec is the
second-level domain, and .com is the top-level domain.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...