McAfee HARDWARE 1.4 Guia de Instalação Página 10

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 61
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 9
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 10 of 61
Phishing This category includes sites that typically arrive in hoax e-mail established only to
steal users' account information. These sites falsely represent themselves as
legitimate company Web sites in order to deceive and obtain user account
information that can be used to perpetrate fraud or theft.
Potentially Unwanted
Programs (PUPs)
A program that performs some unauthorized (and often harmful or undesirable) act
such as viruses, worms, and Trojan horses.
Quarantine Enforced isolation of a file or folder for example, to prevent infection by a virus
or to isolate a spam e-mail message until action can be taken to clean or
remove the item.
Scanning Engine The mechanism that drives the scanning process.
Signature The description of a virus, malware or attack methodology.
Spam Score A rating system used to indicate the likelihood that an e-mail message contains
spam. The higher the score allocated to a message, the more likely it is to be
spam.
Spyware This category includes URLs that download software that covertly gathers user
information through the user's Internet connection, without his or her knowledge,
usually for advertising purposes. This may be considered a violation of privacy and
may have bandwidth and security implications.
Transparent Mode In either Transparent Router mode or Transparent Bridge mode the
communicating devices are unaware of the intervention of the appliance the
appliance’s operation is transparent to those devices.
Trojan Horse A program that either pretends to have, or is described as having, a set of useful or
desirable features, but actually contains a damaging payload. Trojan horses are
not technically viruses, because they do not replicate.
Virus A program that is capable of replicating with little or no user intervention, and the
replicated program(s) also replicate further.
Whitelist A list of e-mail addresses or domains that you create, which the anti-spam module
treats as non-spam. When the anti-spam module detects an incoming message
from an address or domain on the whitelist, it immediately assigns a very high
negative score to that message.
Worm A virus that spreads by creating duplicates of itself on other drives, systems, or
networks.
Table 1 - TOE Specific Terminology
Vista de página 9
1 2 ... 5 6 7 8 9 10 11 12 13 14 15 ... 60 61

Comentários a estes Manuais

Sem comentários