Tuesday, August 31, 2010
What are the symptoms of an infected computer? And what can be done about it?
It’s not always easy to tell if your computer has been compromised. More than ever before, the authors of viruses, worms, Trojans and spyware are going to great lengths to hide their code and conceal what their programs are doing on an infected computer. That’s why it’s essential to follow the advice given in this guide: in particular, install Internet security software, make sure you apply security patches to your operating system and applications and backup your data regularly.
It’s very difficult to provide a list of characteristic symptoms of a compromised computer because the same symptoms can also be caused by hardware and/or software problems. Here are just a few examples:
Your computer behaves strangely, i.e. in a way that you haven’t seen before.
You see unexpected messages or images.
You hear unexpected sounds, played at random.
Programs start unexpectedly.
Your personal firewall tells you that an application has tried to connect to the Internet (and it’s not a program that you ran).
Your friends tell you that they have received e-mail messages from your address and you haven’t sent them anything.
Your computer ‘freezes’ frequently, or programs start running slowly.
You get lots of system error messages.
The operating system will not load when you start your computer.
You notice that files or folders have been deleted or changed.
You notice hard disk access (shown by one of the small flashing lights) when you’re not aware of any programs running.
Your web browser behaves erratically, e.g. you can’t close a browser window.
And what can be done about it?
Don’t panic if you experience any of the above. You may have a hardware or software problem, rather than a virus, worm or Trojan. Here’s what you should do:
Disconnect your computer from the Internet.
If your operating system will not load, start the computer in Safe Mode (when you switch on the computer, press and hold F8 as soon it begins, then choose 'Safe Mode' from the menu that will appear), or boot from a rescue CD.
Make sure your anti-virus signatures are up-to-date. If possible, don't download updates using the computer you think is compromised, but use another computer (e.g. a friend’s computer). This is important: if your computer is infected and you connect to the Internet, a malicious program may send important information to a remote hacker, or send itself to people whose e-mail addresses are stored on your computer.
If you have any problems removing malicious programs, check your Internet security vendor’s web site for information on any dedicated utilities that may be needed to remove a particular malicious program. If your computer is connected to a local area network, disconnect it from the network.
Scan the whole computer.
If a malicious program is found, follow the guidelines provided by your Internet security vendor. Good security programs provide the option to disinfect infected objects, quarantine objects that may be infected, and delete worms and Trojans. They also create a report file that lists the names of infected files and the malicious programs found on the computer.
If your Internet security software doesn't find anything, your machine is probably not infected. Check the hardware and software installed on your computer (remove any unlicensed software and any junk files) and make sure you have the latest operating system and application patches installed.
If necessary, contact your Internet security vendor’s technical support department for further advice. You can also ask them how to submit a sample file for analysis by a virus researcher.
Department Issued Orders For Grant of Honorarium to the officials entrusted with the fixation of Time Related Continuity Allowance (TRCA) and payments of arrears to Gramin Dak Sevaks consequent on implementation of Recommendations of One-man Committee
No.42-1/2008-PAP
Government of India
Ministry of Communications &IT
Department of Posts
(Establishment Division)
Dak Bhawan,Parliament Street
New Delhi-110001
Dated 26.08.2010
Chief Postmasters General
Postmasters General
General Manager Finance
Director of Accounts Postal
Sub: Grant of Honorarium to the officials entrusted with the fixation of Time Related Continuity Allowance (TRCA) and payments of arrears to Gramin Dak Sevaks consequent on implementation of Recommendations of One-man Committee.
Sir/Madam,
I am directed to refer to this office of even no. dated 21.12.2009 regarding rates of Honorarium for fixation of pay in revised scales consequent on implementation of recommendation of 6th Central Pay Commission was communicated.
2. The demand of staff side for extension of the Honorarium rates to those officials entrusted with fixation of Time Related Continuity Allowance (TRCA) and payment of arrears to Gramin Dak sevaks was engaging the attention of the department for quite some time past. Now, the Competent Authority in consultation with Integrated Finance Wing has approved grant honorarium to the officials entrusted with the fixation of Time Related Continuity Allowance (TRCA) and payment of arrears to Gramin Dak Sevaks consequent on implementation of recommendations of One-man Committee and in pursuance of the order no. 6-1/2008-PE.II dt. 09.10.2009. The rates of Honorarium applicable are as under:
(i) Fixation of Time Related Continuity Allowance (TRCA)
A | Fixation of Time Related Continuity Allowance (TRCA)as on 1.1.2006 by the OA of Divisional Office | Rs.5 for each Gramin Dak Sevak |
B | Checking of fixation sheet by the Asstt. Supdt. of Post Offices/Inspector posts as the case may be | Rs.2 for each Gramin Dak Sevak |
(i) Drawal of Arrears
A | Drawal of arrears of Time Related Continuity Allowance (TRCA)and entry in the original Bill. | Rs.1 for entry for each Gramin Dak Sevak for each month. |
B | Checking of drawal of Arrears and entry in the original Bill by the supervisors in the HO/HRO | Rs.1 for each Gramin Dak Sevak |
(III) | Post Check of the drawal by Pre- Check unit | Rs. 2 per case. |
3. The honorarium is applicable to such case where the fixation of Time Related Continuity Allowance (TRCA) has been found to be certified as correct by the Postal Accounts office. The Honorarium shall not be applicable, where the fixation of Time Related Continuity Allowance (TRCA) was done irregularly and paid erroneously.
4. The Prescribed ceiling on grant of Honorarium has to be kept in view while payment of Honorarium and on no account should it exceed the prescribed Ceiling.
5. The Expenditure for payment of Honorarium has to be met within the Budget Grant provided for the year.
6. This issues with the concurrence of Integrated Finance Wing vide their Diary no. 188/FA/10/CS Dated 25.08.2010.
Sdxxx
(K. Rameswara Rao)
Assistant Director General (Estt)
--
M.Krishnan
Secretary General NFPE
Posted by NFPE
Saturday, August 28, 2010
Union Cabinet approved Direct Tax Code (DTC)
Paving the way for radical reform and simplification in the Direct Tax system the Union Cabinet on Thursday approved the much-talked about Direct Tax Code (DTC) Bill proposing to provide more Income Tax relief to salaried class.
The DTC Bill, which seeks to replace the archaic Income Tax Act, 1961, proposes to raise the Income Tax exemption limit from existing Rs 1.6 lakh to Rs Two lakh, highly placed sources said. The Income Tax exemption limit for senior citizens is proposed to be raised to Rs 2.5 lakh.
Under the moderate tax slab suggested in the DTC Bill the government proposes tax rate of
10 per cent for income between Rs 2 lakh and Rs 5 lakh,
20 per cent for income between Rs 5 lakh -
Rs 10 lakh and 30 per cent for income over Rs 10 lakh.
Currently the Income Tax rate is 10 per cent on income above Rs 1.6 lakh and upto Rs 5 lakh, 20 per cent on income above Rs 5 lakh and upto Rs 8 lakh and 30 per cent on income above Rs 8 lakh.
The first draft of the DTC bill had suggested
10 per cent tax on income between Rs 1.60 lakh and Rs 10 lakh,
20 per cent on income between Rs 10 and Rs 25 lakh and
30 per cent beyond that.
The DTC Bill proposes to levy Corporate Tax at 30 per cent and there will be no cess and surcharge on it, sources said. The DTC Bill will be introduced in the ongoing Monsoon session of Parliament.
The Cabinet at its hour-long meeting chaired by the Prime Minister discussed at length various provisions of the DTC Bill, which will seek to bring about radical reforms and simplification in direct tax structure including the Income Tax rates and exemptions.
The overall thrust of the DTC Bill will be on bringing about simplification of direct tax system including personal Income Tax and Corporate Tax with “an in-built bias” in favour of moderation of tax rates, sources close to the preparation of draft legislation said.
Provisions of the DTC Bill stipulating the tax rates in direct tax front including Income tax and Corporate Tax will come into effect once it the legislation is approved by both houses of Parliament.
The government plans to implement various provisions of the DTC Bill with effect from April One 2011.
It is learnt that the government is likely to introduce the DTC Bill either tomorrow or next Monday in both houses of Parliament. After its introduction the draft DTC will be sent to Select Committee of both houses for scrutiny.
After examining the recommendations of the Select Committee the government will move the DTC Bill for approval of Parliament in the Winter Session.
Later, talking to newspersons, the Finance Minister Pranab Mukherjee said, “The whole objective is that a plethora of exemptions will be limited. (Income) tax slabs will be three. Rate of taxes will be taken in the schedule so that they need not be changed every year,” he said. The Finance Ministry submitted the draft DTC Bill for consideration of the Cabinet after examining responses from various stake holders including trade, industry and corporate sector.
Source: Deccan Herald
Friday, August 27, 2010
5 ways to speed up your Computer
Thursday, August 26, 2010
FAQs- Government Employees
Whether the element of DA is to be taken in Salary while calculating emoluments for HRA rebate?
Ans. 1: DA+ Part of DA merged with Basic Pay and shown as Dearness pay is also included in the definition of salary for working out the amount of exemption under section 10 (13 A) (Circular No.6/2004 F.No.275/192/2004-IT,CB) dated 6.12.04 issued by Govt. of India, Ministry of Finance (example No.4)
Can an official draw HRA when he/she is living in leased accommodation (Self house taken on lease allotted to spouse.)?
Ans. 2: As per para 5(c)(iii) of the orders of CCA/HRA, HRA is not admissible to the employee, if his/her spouse has been allotted accommodation at the same station by Centre/State, Autonomous PSU or Semi Govt. Organisation such as Municipality, Port Trust etc., It will be treated as an allotted Govt accommodation for this purpose. (Para 5(c) (iii) of CCA/HRA Rules)
Should the Account payee cheques be entered in Cash Book?
Ans. 3: An A/c payee crossed cheque or Bank draft drawn in the personal name of a recipient by a PAO or cheque drawing DDO and routed through Deptt. officer merely for purpose of delivery, need not be entered in Cash Book. The delivery of such cheques may be recorded & watched through a separate crossed cheque & Bank draft Register. (Exception (a) below Rule-13 of Receipt & Payment Rules.)
The language of certificate required to be appended in Cash Book on the last working day of the month may be given.
Ans. 4:The certificate will be in the following form. "Certified that the Cash amounting to Rs……. (Rupees………..only) has been physically verified and found correct as per the balance recorded in Cash Book. (Rule 13 of Receipt & Payment Rules.)
Is it compulsory for an official to submit the ticket as a token of proof?
Ans. 5: The official is required to give particulars of ticket No. ( For journey by Rail/Bus)
If an officer is transferred and relieved in the middle of month and his pay and allowances have been paid to the end of previous month, can the service verification be done till the middle of month?
Ans. 6: The service verification has to be done for the period payment has been made. Accordingly if an official had been paid till the end of previous month, the service verification will be done till the end of previous month i.e. till he was paid inspite of the fact that he was relieved in the middle of month ( Govt. of India, Ministry of Finance O.M. No.F11(19)E-II CA7/58 dated 29.10.58 under Rule 81 of GFR)
Totals of Cash Book have been checked by the Cashier. Is it necessary that the same should be re-checked. Ans.7: The totals of Cash Book are required to be checked by an official other than the writer of the Cash Book,(Rule 13(3)of Receipt & Payment Rules) and a certificate to this effect is required to be recorded by such official checking the totals.
What should be the treatment of over stayal on leave?
Ans. 8: The overstayal period should be debited to HPL to such extent such leave is due and the balance, if any, treated as EOL. No leave salary is payable for such period of overstayal. The sanctioning authority is competent to regularize the overstayal of any period of leave due and admissible (Rule 25 of CCS (leave) Rules). However, wilful absence from duty after the expiry of leave renders a Govt. servant liable for disciplinary action. (Please refer Govt. of India O.M. No. 6/28/70. Disc. I (SPB. I) dated 05.10.1975 below Rule –11 of CCS(CCA) Rule and O.M. No. 6/28/70. Disc. I, dated 10.02.1972 and 5.10.1972 below Rule-25 of CCS(Leave) Rules.)
An official's increment fell due on 1.10.04 which was declared holiday. The official was on EL for 3 days i.e. 2.10.04 to 4.10.04 and joined dutes on 5.10.04. When will he be allowed increment?
Ans. 9: In this case 1.10.04 has to be treated as holiday prefixed to 2.10.04, and the increased pay has to be drawn from 1.10.04, and thereafter the leave salary. (FR-26 OM.NO.F1(22)-E-III/(A)/73 date 24-8-74.)
Can the special increment be stopped after the death of spouse?
Ans. 10: The special increment granted for undergoing sterlisation operation remains fixed during the entire service. It can be withdrawn only on account of recanalisation and that too from the date of recanalisation. (GIO(11)below FR 27)
Can an official be allowed to draw Transport Allowance if he is residing in a private building but with in one Km from office?
Ans. 11: The Transport Allowance, cannot be given only if the official is residing in Govt. accommodation within one Km. from the place of work or within a campus housing the places of work and residence. (Para 3(ii)of Min. of Finance OM No.21(1) 97-E-II (B)dated 3.10.97)
An official promoted opts for initial pay fixation at the stage next above the pay drawn in the lower scale and re-fixation on the date of accrual of next increment in the Scale of pay of the lower post. Now will the benefit of notional increment or Rs.100/- whichever is more be allowed on this option?
Ans.12:The benefit of notional increment or Rs.100/-, whichever is more, will be granted while fixing his pay under FR 22(I)(a)(i) after the accrual of increment in the lower post. Initially, the pay will be fixed at the stage of the time-scale of the new post above the pay in the lower post from which he is promoted. As per saving clause of FR-22(I)(a)(i) the option can be exercised only in the case of regular promotions and it should be exercised within one month from the date of promotion.
Can the ACP Scheme benefit be allowed to an official who has refused the promotion and has completed 12 years.
Ans. 13: Where promotion has been offered before the employee can be considered for grant of benefit of ACP scheme but refuses to accept such promotion then he cannot be said to be stagnating as he has opted to remain in the existing grade on his own. As such there is no case for grant of ACPs in such case.(Item.38 of Annexure to Govt of India Deptt of Personnel & Training OM No.35034/1/97-Estt(D)(Vol,IV) dt.18.7.01.)
What is the criteria for drawing transport allowance(i) pay being drawn; or (ii)scale of pay?
Ans. 14:The basis for the quantum of transport allowances is only the scale of pay in which the official draws pay.(Govt. of India, Ministry of Finance O.M. No.21(1)/97/E-II(B), dated 3.10.1997.)
Can an official who is on commuted leave avail LTC.
Ans. 15: The LTC can be availed during any period of leave including casual leave and special casual leave, but it can not be availed during the week-end or any other period of holidays or without any leave. (Rule 7 (2) of CCS(LTC)Rule and C& AG order No.488- Audit I/15-83(II), dated 19.06.1987.
Whether an employee will have an option to get his pay fixed on promotion in terms of saving clause under FR-22(I)(a)(1) in the case of stagnation increment.
Ans. 16: As per Govt. of India Deptt. of Personnel and Training, O.M. No.18/16/94 – Estt. (Pay-I), dated 06.06.1994, the date of stagnation increment will be treated in the same manner as normal increment. Accordingly, the Govt. servant on promotion will have the option to get his pay fixed as provided in the saving clause of FR-22(I)(a)(1). In other words, Govt. servant shall have the option , to have the pay fixed under FR-22(I)(a)(1) from the date of promotion or to have the pay fixed initially at the stage of time scale of the new post above the pay in the lower post and get his pay refixed under FR-22(I)(a)(1) from the date of accrual of stagnation increment in the pay scale of the lower post.
Clarification regarding fixation of pay of school teachers on promotion to the post involving higher duties and responsibilities having identical pay scale.
Ans. 17: According to the clarification issued by Govt. of India, Ministry of Human Resource Development, Deptt. of Education, vide their order No. F.5-28/93-UT-I, dated 09.09.1994, when a teacher is promoted to the next higher post from basic scale or senior scale, his / her pay will now be fixed under FR-22(I)(a)(1).
In the case of an employee appointed on ad hoc basis and who is subsequently regularized, the ad hoc service is counted towards increment. Whether the ad hoc service may be counted for the ACPS also?
Ans. 18: In terms of Para 3.2 of the office memorandum, dated August 9, 1999 (ACPS), only regular service which counts for the purpose of regular promotion in terms of relevant Recruitment/ Service Rules shall count for the purpose of upgradation under ACPS.
The relevant Recruitment/ Service Rules prescribe departmental examination/ skill test for vacancy based promotion . However , this need not be insisted for upgradation under ACPS.
Ans.19: All promotion norms have to be fulfilled for upgradation under the scheme. As such, no upgradation shall be allowed if an employee fails to qualify departmental/ skill test prescribed for the purpose of regular promotion.
Whether the benefit of past service will be extended to temporary status employees after their regularization?
Ans. 20: No, the benefit of past service shall not be extended to temporary status employees after their regularization for the purpose of ACPS.
Whether it is necessary to have SC/ST member in the screening committees set up for grant of ACPS.
Ans. 21: As clarified vide condition no. 12 of ACP Scheme (vide DOP & TO.M. dated 9.8.1999), reservation orders/ roster shall not apply to the ACP Scheme. Consequently, it is not necessary to have an officer from SC/ST communities on the Screening Committee constituted for deciding the suitability of the employee for upgradation under ACPS.
What are the registers that are required to be kept by drawing & disbursing officers(Auditee Units)?
Ans.22:
1.Cash Book
2. T.R.5 Receipt Books
3. Register of Undisbursed Pay & Allowances
4. Contingent Register.
5. Bill Register.
6. Vouchers paid during the selected month and in general for the periodicity of Audit.
7. Permanent Advance Register.
8. Surety Bond and Special pay to Cashier.
9. Theft and losses Cases, if any.
10. Stock Register and Stores Accounts.
11. A.D.A Records.
12. Register of Service Book and Leave Accounts.
13. G.P.F. of Class IV and Broad Sheet..
14. Dead Stock Register.
15. Register of unserviceable stores.
16. Account of empties.
17. Register of Telephone and Trunk Call Charges.
18. Liveries Register.
19. Despatch Register and Stamp Account Register
20. Increment Register.
21. O.T.A Register
22. C.E.A Register
23. Pay Fixation Cases.
24. Pay Bill Register.
25 .H.R.A.forms.
26. Medical Charges Reimbursement Register.
27. Stationery Register and connected Rec ord.
28. Procedure and purchase cases.
29. Log Book and P.O.L Account.
30. Pension cases details.
31. Stock Register of Consumer Articles.
32. Employees Group Insurance scheme.
33. Any other record/registers other than the above maintained by the office.
34. All purchase cases above the value of Rs.20,000.
35. Remittance into the Bank.
36. T.A.Register.
Source: www.delhi.gov.in
Permitted to Withdraw Cash Five Times in a Month Free of Charge from other Banks’ ATMs
Cabinet likely to consider DTC Bill on Thursday
Monday, August 23, 2010
Happy ONAM wishes to all CG Employees of Kerala
Onam (Malayalam: ഓണം) is the biggest festival in the Indian state of Kerala. It falls during the first month of the Malayalam calendar which is Chingam (August–September) and marks the homecoming of the legendary King Mahabali. The festival lasts for ten days and is linked to many elements of Kerala's culture and tradition. Intricate flower carpets, elaborate banquet lunch, snake boat races and the kaikottikkali dance all play a part in the festival. (Wikipedia.org)
Posted by imyideas.com
My dearest friend Kiran Reddy got Award from CPMG, Maharashtra Circle
Saturday, August 21, 2010
Glossory: Virus
%CommonProgramFiles%
Refers to the Common Files folder. By default, this is C:\Program Files\Common Files.
%CurrentFolder%
Refers to the folder where the risk was originally executed.
%DriveLetter%
Refers to any drive letter assigned to fixed, mapped, or removable drives that may be connected to the computer. For example, a USB key connected to the computer may appear as drive D.
%ProgramFiles%
Refers to the program files folder. By default, this is C:\Program Files.
%System%
Refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP, Vista).
%SystemDrive%
Refers to the drive on which Windows is installed. By default, this is drive C.
%Temp%
Refers to the Windows temporary folder. By default, this is C:\Windows\TEMP (Windows 95/98/Me), C:\WINNT\Temp (Windows NT/2000), C:\Documents and Settings\[CURRENT USER]\Local Settings\Temp (Windows XP), or C:\User\[CURRENT USER]\AppData\Local\Temp (Windows Vista).
%UserProfile%
Refers to the current user's profile folder. By default, this is C:\Documents and Settings\[CURRENT USER] (Windows NT/2000/XP) or C:\User\[CURRENT USER] (Windows Vista).
%Windir%
Refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.
.dam
Indicates a detection for files that have been corrupted by a threat or that may contain inactive remnants of a threat, causing the files to fail to properly execute or produce reliable results.
.dr
Refers to a file that is considered a dropper. This program drops the virus or worm onto the victim's computer.
.enc
Refers to a file that is encrypted or encoded. For example, a worm that creates a copy of itself with MIME encoding may be detected with the .enc suffix.
@m
Signifies that the virus or worm is a "mailer." An example: Happy99 (W32.Ska) only sends itself by email when you send mail.
@mm
Signifies that the virus or worm is a "mass-mailer." An example: W97M.Melissa.A sends messages to every email address in your mailbox.
A predefined response to an event or alert by a system or application.
A type of report in which all the recorded events are sequentially organized.
An environment or context defined by a security policy, security model, or security architecture.
Adware is a software package that facilitates the delivery of advertising content to the user. Learn more about different adware risks.
Age
A rating used to calculate the vulnerability based on the relative amount of time since the discovery of the vulnerability. According to experts, the potential for exploiting a vulnerability increases as the age of the vulnerability increases. The assumption that people are likely to be aware of the existence of the vulnerability supports this statement. The L-3 Network Security researchers assign lower ratings to the age factor of recently discovered vulnerabilities. Older vulnerabilities are rated higher.
Alarm
A sound or visual signal triggered by an error condition.
Alert
An automatic notification that an event or error has occurred.
Alertable event
Any event or member of an event set configured to trigger an alert.
Also Known As
Names that other antivirus vendors use to identify a threat. Often Symantec's bloodhound heuristics will identify a potential threat before a specific detection is added. In such cases, the name of the bloodhound detection will appear in this field.
Antivirus
A subcategory of a security policy that pertains to computer viruses.
Application server
A software server that lets thin clients use applications and databases that are managed by the server. The application server handles all the application operations and connections for the clients.
Asset
A physical item, informational item, or capability required by an organization to maintain productivity. Examples include a computer system, a customer database, and an assembly line.
Asset measure
A quantitative measurement of an asset. The asset measure is the confidentiality, integrity, and availability of an asset in relation to other assets in an organization.
Asset value
The perceived or intrinsic worth of an asset.
Attack signature
The features of network traffic, either in the heading of a packet or in the pattern of a group of packets, which distinguish attacks from legitimate traffic.
Attribute
A property of an object, such as a file or display device.
Authenticated, self-signed SSL
A type of SSL that provides authentication and data encryption through a self-signed certificate.
Authentication
The assurance that a party to some computerized transaction is not an impostor. Authentication typically involves using a password, certificate, PIN, or other information that can be used to validate the identity over a computer network.
AutoInstall package
An executable created by AI Snapshot and AI Builder that contains one or more applications distributed to client computers using the Symantec Ghost Console.
The risk that exists before safeguards are considered.
A measure of the speed at which a device, such as a modem, can transfer bits of data.
To simultaneously send the same message to all the users on a network.
The window in which hosts and other drawing objects, which represent a network scheme, are placed.
The measure of a threat's technical expertise or knowledge of a system's connectivity.
Capability Maturity Model for Software (CMM or SW-CMM)
The discrimination between lowercase and uppercase characters.
This payload may cause the computer to crash or to behave in an unexpected fashion.
Cryptographic systems use this file as proof of identity. It contains a user's name and public key.
An office or bureau that issues security certificates.
Certificate authority-signed SSL
A database that contains security certificates.
A program that makes requests of, or transmits data to, a parent server program.
A method of reporting in which data is retrieved from the server and processed at the client.
Common Information Model (CIM)
The transfer of data between computers by a device such as a modem or cable.
Communications port (COM port)
The successful establishment of a communications link.
The remaining risk after safeguards have been applied.
A list of standardized names for vulnerabilities and other information security exposures - CVE aims to standardize the names for all publicly known vulnerabilities and security exposures. (Source: CVE Web site)
Click here to read more about Symantec and CVE compatibility.
A template that defines files or registry entries to be included in a backup.
The electronic transfer of information from a sending device to a receiving device.
To perform a remote installation.
A process in which one computer attempts to locate another computer on the same network or domain.
Distributed Management Task Force (DMTF)
This component measures how quickly a threat is able to spread.
The folder in which files that are received during file transfer are stored.
A program that interprets commands for transferring to and from peripheral devices and the CPU.
Extended Partition Boot Record (EPBR)
A predefined event category used for sorting reports and configuring alerts.
The process by which events from disparate sources are mapped to a consistent framework.
Event viewer (ITA event viewer)
Extended (partition)
An extended partition is a primary partition that was originally developed in order to overcome the four-primary-partition limit. The extended partition is a container, or a place-holder, for logical partitions. The extended partition itself does not contain any data, nor does it receive a drive letter assignment. It can contain any number of logical partitions, and each logical partition receives a drive letter assignment, as long as the logical partition is recognized by the operating system.
eXtensible Markup Language (XML)
The common language of the Web used to exchange information.
External Hostile Structured (EHS) threat
An individual or group outside of an organization that is motivated to attack, exploit, or disrupt mission operations. This highly funded, extremely skilled threat has substantial resources and unique tools. Foreign intelligence services, criminal elements, and professional hackers involved in information warfare, criminal activities, or industrial intelligence often fall into the EHS threat category.
External Hostile Unstructured (EHU) threat
An individual outside of an organization who is motivated to attack, exploit, or disrupt mission operations. This individual has limited resources, tools, skills, and funding to accomplish a sophisticated attack. Many Internet hackers and most crackers and vandals fall into the EHU threat category.
External Nonhostile Structured (ENS) threat
An individual outside of an organization who has little or no motivation for attacking it. However, this threat has special resources, skills, tools, or funding to launch a sophisticated attack. System and network security professionals who use the Internet to obtain information or improve their skills usually fall into the ENS threat category.
External Nonhostile Unstructured (ENU) threat
An individual outside of an organization who has little or no motivation for attacking. This threat has limited resources, skills, tools, or funding to launch a sophisticated attack. Common Internet users fall into the ENU threat category.
External threat
A threat that originates outside of an organization.
A FAT32 partition that crosses over the 1024th cylinder of a hard drive.
Fully Qualified Domain Name (FQDN)
Refers to a virus compiled using a high-level language that overwrites files.
Hoaxes usually arrive in the form of an email. Please disregard the hoax emails - they contain bogus warnings usually intent only on frightening or misleading users. The best course of action is to merely delete these hoax emails. Learn more about different hoaxes.
Host
1. In a network environment, a computer that provides data and services to other computers. Services may include peripheral devices, such as printers, data storage, email, or World Wide Web access. 2. In a remote control environment, a computer to which remote users connect to access or exchange data.
Hypertext Transfer Protocol Secure (HTTPS)
A variation of HTTP that is enhanced by a security mechanism, which is usually the Secure Sockets Layer (SSL).
A condition that prevents an action from being executed on a rule.
A file that is created using Norton Ghost. An image file of a disk or partition is created and used to produce duplicates of the original disk or partition.
Image file definition
A description of the properties of an image file, including the image file name, location, and status
Impact
The effect, acceptable or unacceptable, of an incident on a system, operation, schedule, or cost. Unacceptable impact is impact deemed, by the system owner and as compared to the missions and goals of the U.S. Department of Defense (DOD), as severe enough to degrade an essential mission, capability, function, or system causing an unacceptable result. Like impact, unacceptable impact refers to the total system and all areas of operational concern, not only confidentiality.
Inactive
A status indicating that a program, job, policy, or scan is not currently running. For example, when a scheduled scan awaits for the specified date and time to execute, it is inactive.
Incident
The actualization of a risk. The event or result of a threat that exploits a system vulnerability.
Incident response
The ability to deliver the event or set of events to an incident management system or a HelpDesk system to resolve and track incidents.
Incident response cycle
The sequence of phases that a security event goes through from the time it is identified as a security compromise or incident to the time it is resolved and reported.
Infection Length
This is the size, in bytes, of the viral code that is inserted into a program by the virus. If this is a worm or Trojan Horse, the length represents the size of the file.
Information
A rating used to calculate a vulnerability, based on the relative availability of information that discloses a vulnerability. For example, if a vulnerability is disclosed in books or on the Internet, then the information factor is rated high. If a vulnerability is not well-known and little or no documentation on the vulnerability exists, then information is rated low.
Initialize
To prepare for use. In communications, initialize means to set a modem and software parameters at the start of a session.
Integrated Services Digital Network (ISDN)
A type of phone line used to enhance Wide Area Network (WAN) speeds. ISDN lines can transmit at speeds of 64 or 128 kilobits per second (Kbps), as opposed to standard phone lines, which transmit at only 9600 bps. The phone company installs an ISDN line at both the server and remote sites.
Internal Hostile Structured (IHS) threat
An individual or group within an organization that is motivated to disrupt mission operations or exploit assets. This threat has significant resources, tools, and skills to launch a sophisticated attack and potentially remove any evidence of the attack. An IHS threat is unlikely to act but has the greatest potential to cause damage. Highly skilled, disgruntled employees (such as system administrators or programmers) or technical users who could benefit from disrupting operations often fall into the IHS threat category.
Internal Hostile Unstructured (IHU) threat
An individual within an organization who has physical access to network components. This individual is motivated to disrupt the operations of the organization but lacks the resources, tools, or skills necessary to launch a sophisticated attack. It would not be unusual for this threat to attack the organization by deploying a common virus. Unskilled, disgruntled employees or users who could benefit from disrupting operations often fall into the IHU threat category.
Internal Nonhostile Structured (INS) threat
An individual within an organization who has physical access to network components. This individual is not motivated to disrupt mission operations but can do so by making common mistakes. Individuals executing INS threats are usually skilled and have tools to assist them in performing security-related functions. System administrators, network engineers, and programmers often fall into the INS threat category.
Internal Nonhostile Unstructured (INU) threat
An individual within an organization who has physical access to network components. This individual is not motivated to disrupt mission operations but can do so unknowingly. Individuals executing INU threats do not have any unusual skills or tools and are not interested in attacking. Usually, they are typical users who make mistakes that can impact mission operations. The INU threat category is typically the most likely to disrupt operations.
Internal threat
A threat that originates within an organization.
Internet Engineering Task Force (IETF)
An international community of network designers, operators, vendors, and researchers who are concerned with the evolution of Internet architecture and the smooth operation of the Internet. IETF is open to any interested individual. The technical work of the IETF is done in its working groups, which are organized by topic into several areas (such as routing, transport, security, and so on). Much of the work is handled via mailing lists.
Internet Protocol (IP) address
Identifies a workstation on a TCP/IP network and specifies routing information. Each workstation on a network must be assigned a unique IP address, which consists of the network ID, plus a unique host ID assigned by the network administrator. This address is usually represented in dot-decimal notation, with the decimal values separated by a period (for example 123.45.6.24).
Internet Relay Chat (IRC)
IRC is a multi-user chat system, where people meet on "channels" (rooms, virtual places, usually with a certain topic of conversation) to talk in groups, or privately. This system also allows for the distribution of executable content.
Interrupt Requests (IRQ)
Also called hardware interrupts. IRQ means that a connection device signals other hardware components that it needs attention. When you install new devices (such as serial ports, modems, and mouse devices), you may find that previous devices no longer work, because the new devices use the previously used IRQs.
Intruder Alert agent
In Intruder Alert, the agent monitors the hosts and responds to events, by performing defined actions based on applied security policies.
Intruder Alert manager
A software application that runs in the background mode as either a UNIX daemon or a Windows NT service.
Managers:
- Maintain secure communications with all registered Agents,
- Maintain the master list of domains and policies applied to each Agent,
- Communicate domain and policy changes to Agents,
- Receive and store event data from Agents, via the Record to Event Viewer action,
- Serve as the communications link among the Intruder Alert Administrator, Intruder Alert Event Viewer, and Agents, and
- Maintain the list of policies and the domains to which they are applied.
Intrusion Detection
A security service that monitors and analyzes system events to find and provide real-time or near real-time attempt warnings to access system resources in an unauthorized manner. This is the detection of break-ins or break-in attempts, by reviewing logs or other information available on a network.
Intrusion Detection Exchange Format (IDEF)
See Intrusion Detection Working Group (IDWG).
Intrusion Detection Working Group (IDWG)
A group that defines data formats and exchange procedures for sharing information of interest to intrusion detection and response systems, as well as to management systems that may need to interact with them. The IDWG coordinates its efforts with other Internet Engineering Task Force work groups.
Key codes assigned to sets of specific instructions. Also see macro.
Malware is a category of malicious code that includes viruses, worms, and Trojan horses. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.
Management Information Base (MIB)
A database of objects that can be monitored by a network management system. Both SNMP and RMON use standardized MIB formats that allow any SNMP and RMON tool to monitor any device defined by an MIB.
Master Boot Record (MBR)
Master Boot Record. The Master Boot Record is contained in the first sector of the hard drive. It identifies where the active partition is, and then starts the boot program for the boot sector of that partition. The boot sector identifies where the operating system is located and enables the boot information to be loaded into the computer's main storage or RAM. The Master Boot Record includes a table that locates each partition that is present on the hard drive.
MD5
A hash function such as MD5 is a one-way operation that transforms a data string of any length into a shorter, fixed-length value. No two strings of data will produce the same hash value.
An MD5 checksum verifies the data integrity by running a hash operation on the data after it is received. The resultant hash value is compared to the hash value that was sent with the data. If the two values match, this indicates that the data has not been altered or tampered with, and its integrity may be trusted.
Click here to learn more about MD5 and to download an MD5 checksum utility.
Click here for a list of MD5 hashes for all available Virus Definitions Intelligent Updater downloads.
Microsoft Management Console (MMC)
An extensible, common console framework for management applications. Management applications are composed of MMC snap-ins, which add management functionality to MMC. The Symantec System Center console and the Symantec AntiVirus Corporate Edition snap-ins add functionality to administer computers that run the Symantec AntiVirus Corporate Edition software.
Middleware
An application connecting two otherwise separate applications.
Misleading applications
Programs that report false or significantly misleading information on the presence of a security risk, threat or system issue on the computer being scanned.
Mobile Code
Code (software) that is transferred from a host to a client (or another host computer) to be executed (run). A worm is an example of malicious mobile code.
Mode
A system state in which a single action or a series of actions are performed. A mode has an On condition and an Off condition.
For example, an Outbreak mode under Symantec Mail Security for MS Exchange might look like:
- Mode On condition: More than 30 email messages with the same subject line are detected in a period of 10 minutes.
- Action(s): Quarantine all emails with subject line , run LiveUpdate every 10 minutes.
- Mode Off condition: Less than 10 email messages with the same subject line are detected in a period of 10 minutes.
Modem
A device that enables a computer to transmit information over a standard telephone line. Modems can transmit at different speeds or data transfer rates. See also baud rate, bps.
Modifies files
This payload changes the contents of files on the computer and may corrupt files.
Module
An executable that runs security checks on specific areas of the server or workstation security.
Motivation
The relative amount of incentive that a threat has to compromise or damage the assets of an organization.
Multicast
To simultaneously send the same message to a list of recipients on a network.
Most worms are spread as attachments to emails. This field indicates the usual name or names that the attachment can be called.
NetProwler agent
A component that monitors the traffic on a network segment to detect, identify, and respond to intrusion attacks.
NetProwler console
The Graphical User Interface (GUI) provided for managing all the agents assigned to a NetProwler manager. From the console, you can assign agents, configure agents, monitor agent alerts, query the NetProwler manager for specific information, and generate or view security reports.
NetProwler manager
A component that coordinates the work of NetProwler agents, provides communication between the agents and the user interfaces, and stores security data gathered by the agents.
Network
A group of computers and associated devices connected by communications facilities (both hardware and software) to share information and peripheral devices, such as printers and modems. Also see LAN.
Network resource
Any device or node on a network that NetRecon can identify. Examples include computers, printers, routers, and hubs (certain types). Since devices can be known to a network in multiple ways (for example, one computer may have multiple IP addresses, a NetBIOS name, and a NetWare name), the number of network resources discovered by NetRecon is generally much greater than the number of physical devices connected to the network.
Network station
A computer connected to a LAN through a network adapter card and software.
New Technology File System (NTFS)
File system format recognized only by Windows NT.
Node
1. In a tree structure, a point where two or more lines meet. 2. In a network, any addressable device attached to the network that can recognize, process, or forward data transmissions.
Notification
A predefined response triggered by a system condition, such as an event or error condition. Typical responses include sound or visual signals, such as displaying a message box, sending email, or paging an administrator. The administrator may be able to configure the response. Also see alert.
N-Tier system
A system with managed endpoints, middleware, stand-alone tools, and backend systems.
Null modem cable
A cable that enables two computers to communicate without using modems. A null modem cable accomplishes this by crossing the sending and receiving wires, so that the wire used for transmitting by one device is used for receiving by the other, and vice versa.
Number of countries
A measure of the number of countries where infections are known to have occurred.
Number of infections
Measures the number of computers known to be infected.
Number of sites
Measures the number of locations with infected computers. This normally refers to organizations, such as companies, government offices, and so on.
The likelihood that a threat will manifest itself within an organization.
Two or more assigned safeguards that secure the same vulnerability.
An object that contains the files and instructions for distributing software.
A link from the console to an AI package, either on an attached drive or on a Web server.
The quality of an integer being odd or even. Also see parity bit, parity checking.
Phishing is essentially an online con game and phishers are nothing more than tech-savvy con artists and identify thieves. They use SPAM, malicious Web sites, email messages and instant messages to trick people into divulging sensitive information, such as bank and credit card accounts.
Physical exposure
A rating used to calculate the vulnerability, based on whether a threat must have physical access to your system to exploit a vulnerability.
Ping
A basic Internet program that lets you verify that a particular Internet address exists and can accept requests. The act of using the ping utility or command. Pinging is diagnostically used to ensure that a host computer, which you are trying to reach, actually operates.
Policy
The method of action selected from alternatives, given specific conditions to guide and determine present and future decisions.
Policy library
A repository of all of the policies (preconfigured and user-defined) in ITA.
Polymorphic Virus
A virus that can change its byte pattern when it replicates; thereby, avoiding detection by simple string-scanning techniques.
Port
A hardware location for passing data in and out of a computing device. Personal computers have various types of ports, including internal ports for connecting disk drives, monitors, and keyboards, as well as external ports, for connecting modems, printers, mouse devices, and other peripheral devices.
In TCP/IP and UDP networks, port is the name given to an endpoint of a logical connection. Port numbers identify types of ports. For example, both TCP and UDP use port 80 for transporting HTTP data. A threat may attempt to use a particular TCP/IP port.
Potential damage
A rating used to calculate a vulnerability, based on the relative damage incurred if a threat exploits a vulnerability. For example, if a threat can obtain root privileges by exploiting a vulnerability, the potential damage is rated high. If a vulnerability only lets the threat browse a portion of a file system, and this type of activity causes little or no damage to the network, the potential damage is rated low.
Potentially unwanted application
Programs that computers users wish to be made aware of. These programs include applications that have an impact on security, privacy, resource consumption, or are associated with other security risks. These programs can show a pattern of installation without user permission or notice on a system or be deemed to be separate and different from the application installed.
Predictive risk assessment
A process that consists of risk assessment, business objectives, business objective risk, business task, business task risk, and Business Impact Assessment (BIA).
Predictive vulnerability assessment
A process consisting of vulnerability assessment, safeguards, safeguard assessment, assets, asset value, asset measure, risk, risk measure, and residual risk.
Primary (partition)
A primary partition is referenced in the Master Boot Record partition table and is normally used to contain operating systems and their associated application files. One primary partition on a drive will be active at a time, and any others will typically be hidden and inaccessible (for purposes of DOS compatibility and in order to prevent data corruption between operating systems). A four-primary-partition limit exists on all PC hard drives; one of these primary partitions can be an extended partition, which can contain any number of logical partitions.
Primary server
A computer that runs the Symantec AntiVirus Corporate Edition Server software, which is responsible for configuration and virus definition file update functions in a server group. When you perform a task at the server group level in the Symantec System Center, the task runs on the primary server. The primary server forwards the task to its secondary servers. If the primary server runs Alert Management System2, it processes all the alerts.
Probe
Any effort, such as a request, transaction, or program, which is used to gather information about a computer or the network state. For example, sending an empty message to see whether a destination actually exists.
Ping is a common utility for sending such a probe. Some probes are inserted near key junctures in a network for monitoring or collecting data about network activity.
Profiler
An automated configuration tool that scans a network for live systems and guides you through the process of defining systems that you want to monitor, as well as attack signatures that you want associated with each system.
Profiling
The process of scanning a network for live systems to monitor and of associating attack signatures with those particular systems. Also see profiler.
Property filtering
A subcategory of a security policy that pertains to the properties of email messages, such as attachment size, number of recipients, or whether an attachment is encrypted.
Protocol
A set of rules enabling computers or devices to exchange data with one another with as little error as possible. The rules govern issues, such as error checking and data compression methods. Also see communications protocol.
Proxy
A software agent, often a firewall mechanism, which performs a function or operation on behalf of another application or system while hiding the details involved.
Rapid Release Virus Definitions
Rapid release definitions are most valuable during a high-level outbreak when users are unable to wait for definitions to undergo full quality assurance testing. Rapid release definitions are available here. While rapid release definitions have not been fully certified, Symantec Security Response makes every effort to ensure that all definitions function correctly.
Record
To capture and store a set of data that consists of a series of actions and events.
Region
The part of a network administrated by an ESM Console user. An ESM region can contain managers, domains, agents, security policies, and a summary database that contains the results of the ESM policy runs.
Releases confidential information
This payload may attempt to gain access to important data stored on the computer, such as credit card numbers.
Remote
A computer that connects with a host computer and takes control of it in a remote control session.
The process of duplicating data from one database to another.
A set of data that is organized and formatted according to specific criteria.
The risk that remains after the application of selected safeguards.
A threat that exploits a vulnerability that may cause harm to one or more assets.
A logical statement that lets you respond to an event, based on predetermined criteria.
To execute a program or script.
A Java applet that runs within a Web server environment.
A level assigned to an incident. See incident.
This field indicates the size of the file attached to the infected email.
Spyware is any software package that tracks and sends personally identifiable information or confidential information to third parties. Personally identifiable information is information that can be traced to a specific person such as a full name. Confidential information includes data that most people would not be willing to share with someone and includes bank details, credit card numbers, and passwords. Third parties may be remote systems or parties with local access. Learn more about spyware.
Stateful dynamic signature inspection
An intrusion detection method used to detect attacks. Stateful refers to the virtual processor that lets NetProwler build a context around a monitored network session, enabling efficient analysis and recording of complex events.
Dynamic refers to the ability to create and activate new attack signatures without taking the system offline. Signature Inspection is a method of detection that compares an attack signature with a cache of attack signatures on NetProwler.
Structured external threat
An individual outside of your organization who may be a threat. This person is technically skilled, may collaborate with others, and may use automated tools.
Structured internal threat
An individual inside your organization who may be a threat. This person is technically skilled, may collaborate with others, and may use automated tools.
Structured threat
An individual who may be a threat to your organization. This person is technically skilled, may collaborate with others, and may use automated tools.
Subject of email
Some worms spread by sending themselves to other people through email. This field indicates the subject of the email that the worm sends.
Switched line
A standard dial-up telephone connection; the type of line that is established when a call is routed through a switching station. Also see leased line.
Symantec System Center (SSC) console
A type of software used to monitor and control computers that run supported Symantec client or server software. The SSC console is a snap-in to the Microsoft Management Center management tool. Additional snap-ins, such as the Norton AntiVirus Corporate Edition snap-in, add product-specific management capabilities to the SSC console.
Synchronize
To copy files between two folders on host and remote computers to make the folders identical to one another. (Copying occurs in both directions.) If there are two files with the same name, the file with the most current date and time is copied. Files are never deleted during the synchronization process. See also clone.
Synchronous transmission
A form of data transmission in which information is sent in blocks of bits separated by equal time intervals. The sending and receiving devices must first be set to interact with one another at precise intervals, then data is sent in a steady stream. Also see asynchronous transmission.
Syntax error
An error made by an author when creating a script, such as not enclosing a string in quotes or specifying the wrong number of parameters. Syntax errors are detected during the script compilation and are written to a file with the same source file name and the .err extension. You can use the pcAnywhere Editor to view the .err file, make corrections to the script, and re-attempt compilation.
Systems Security Engineering-Capability Maturity Model (SSE-CMM)
A system for describing the essential characteristics of an organization's security engineering process, which must exist to ensure good security engineering. Engineering organizations can use the model to evaluate and refine security engineering practices; customers, to evaluate a provider's security engineering capability; and security engineering evaluation organizations, to establish organizational, capability-based confidences.
System
A set of related elements that work together to accomplish a task or provide a service. For example, a computer system includes both hardware and software.
Systems Affected
Refers to operating systems or applications that are vulnerable to a threat.
Systems Not Affected
Refers to operating systems or applications that are not vulnerable to a threat. The list of systems may change as more information about a given threat becomes available.
Telephony Application Programming Interface (TAPI)
The severity rating of the virus, worm, or Trojan horse. The threat assessment includes the damage that this threat causes, how quickly it can spread to other computers (distribution), and how widespread the infections are known to be (wild).
Threat containment
A measure of how well current antivirus technology can keep this threat from spreading. As a general rule, older virus techniques are generally well-contained; new threat types or highly complex viruses can be more difficult to contain, and are correspondingly more a threat to the user community. The measures are Easy (the threat is well-contained), Moderate (the threat is partially contained), and Difficult (the threat is currently uncontainable).
Threat measure
A quantitative measurement of a threat. A threat's physical access, electronic access, capability, motivation, and occurrence measure determine the threat measure.
Threat safeguard
A process, procedure, technique, or feature that deters one or more threats to the network, by reducing the risk linked to a system's threat measure.
Threshold
The number of events that satisfy certain criteria. Administrators define threshold rules to determine how notifications are to be delivered.
Time stamp of attachment
This field indicates the date and time of the file attachment.
Time-out
A predetermined period of time during which a given task must be completed. If the time-out value is reached before or during task execution, the task is canceled. You can configure a pcAnywhere host to disconnect from a remote computer after a certain amount of time has passed without activity.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An executable that installs software enhancements to a specific version of ESM.
A threat that tends to be technically unskilled or unsophisticated.
Virus Definitions (Intelligent Updater™)
Corporate network administrators, as well as end users who practice potentially risky Internet behavior (for example, clicking on email attachments from unknown senders or attachments included in unexpected emails, downloading files from newsgroups or suspicious Web sites, and so on) benefit the most from downloading and installing the Intelligent Updater definitions on a daily basis. Intelligent Updater definitions are available here.
Home users: While it is possible, it is not absolutely necessary for you to download and install the Intelligent Updater definitions daily. Symantec receives samples of new risks every day and we build new definitions for these risks daily. However, in many cases these risks are not in the wild, or if in the wild, they have a very low incidence of infection. In any event, if we detect that a risk in the wild is rapidly spreading, we immediately release LiveUpdate packages to fully protect our customers. Additionally, if you suspect that a risk is present on your computer, take advantage of the Scan and Deliver functionality to submit the suspect file for analysis by Symantec Security Response.
For detailed instructions on how to download and install the Intelligent Updater definitions from the Symantec Security Response Web site, click here.
Virus Definitions (LiveUpdate™ Daily)
LiveUpdate Daily definitions are made available each day, providing the most convenient method for protecting your PC from risks. Symantec Security Response fully tests all the definitions for quality assurance before they are posted to the LiveUpdate servers. LiveUpdate Daily is available for the Norton AntiVirus™ 2008, Norton Internet Security™ 2008, Symantec AntiVirus™ Corporate Edition 10.0, and Symantec Client Security™ 3.0 products.
For more information on how LiveUpdate works, click here.
For detailed instructions on how to run LiveUpdate, click here.
Virus Definitions (LiveUpdate™ Plus)
LiveUpdate Plus definitions are available for enterprise customers with Platinum Support entitlements. LiveUpdate Plus allows for daily definition updates for large networks that use the LiveUpdate Administration Utility. For more information on the LiveUpdate Administration Utility, click here.
Virus Definitions (LiveUpdate™ Weekly)
LiveUpdate is the easiest way to obtain definitions and product updates for consumer products. Symantec Security Response fully tests all the definitions for quality assurance before they are posted to the LiveUpdate servers. These definitions are released once each week (usually Wednesdays), unless there is a major outbreak.
For more information on how LiveUpdate works, click here.
For detailed instructions on how to run LiveUpdate, click here.
Virus definitions file
A file that provides information to antivirus software to find and repair risks. In the Symantec AntiVirus Corporate Edition, the administrator must regularly distribute updated definition files to the servers and clients of the Symantec AntiVirus Corporate Edition. Definition files contain protection for all the latest viruses, worms, Trojans and security risks.
Voice first
A functionality that allows the host and remote users have a voice conversation before beginning a data session. Use voice first when you have only one phone line and want to speak with the other user before starting the session.
Vulnerability
A (universal) vulnerability is a state in a computing system (or set of systems) which either:
- Allows an attacker to execute commands as another user
- Allows an attacker to access data that is contrary to the specified access restrictions for that data
- Allows an attacker to pose as another entity
- Allows an attacker to conduct a denial of service
*Source: CVE Web site
Vulnerability assessment
The identification and quantification of a system's technical and environmental vulnerabilities.
Vulnerability Management
The practice of identifying and removing weaknesses that can be used to compromise the confidentiality, integrity, or availability of a computer information asset. A vulnerability management is a preventative information security practice that identifies and removes weaknesses before they can be used to compromise a computer information asset.
Vulnerability measure
A quantitative measurement of vulnerability. Symantec Risk Assessor measures each vulnerability through its physical exposure, electronic exposure, potential damage, age, and information.
Vulnerability measure factors
The elements used to calculate the danger posed by a vulnerability (vulnerability measure). Each vulnerability is rated in terms of its physical exposure, electronic exposure, potential damage, information, and age.
Vulnerability safeguard
A process, procedure, technique, or feature that assists in securing a vulnerability, by reducing the risk linked to the system's vulnerability measure.
Web-Based Enterprise Management (WBEM)
For example, the file specification *.* would return all the files, regardless of their file names.