
McAfee Email Gateway
Security Target
Page 9 of 61
Data Loss Prevention
(DLP)
Refers to systems that identify, monitor, and protect data in use (e.g. endpoint
actions), data in motion (e.g. network actions), and data at rest (e.g. data storage)
through deep content inspection and contextual security analysis of transactions
(attributes of originator, data object, medium, timing, recipient/destination and so
on).
Denial of Service (DoS) A means of attack, an intrusion, against a computer, server or network that
disrupts the ability to respond to legitimate connection requests. A denial-of-
service attack overwhelms its target with false connection requests, so that the
target ignores legitimate requests.
Denied Connection The term used by the TOE to denote traffic dropped in response to matching a
Denial of Service Prevention policy as defined and configured by the TOE
administrator.
Directory Harvest Attack An attack on an email server that utilizes a script to identify and gather valid email
addresses; utilized by spammers.
Encryption Within the context of this ST, typically SWD, S/MIME or PGP.
Explicit Proxy Mode In Explicit Proxy mode some network devices must be set up to explicitly send
traffic to the appliance. The appliance then works as a proxy, processing the traffic
on behalf of these network devices.
Heuristic Analysis A method of scanning that looks for patterns or activities that are virus-like, to
detect new or previously undetected viruses.
Image Filtering A method of scanning that searches for inappropriate images in email traffic and
performs a designated action on discovery.
Internal Network Within the context of this ST, this refers to IT resources which are protected by the
MEG appliance. The MEG appliance is installed between these IT resources and
the WAN.
Keylogger A computer program that captures the keystrokes of a computer user and stores
them.
Network User A remote user or process sending information to the workstation via a network
protocol. This role only has the authority to Send information through the appliance
from either the Internet or the internal network. Network users are unauthenticated
users of the TOE.
Packers Packers are compression tools that compress files and change the binary
signature of the executable. They can be used to compress trojans and make them
harder to detect.
Comentários a estes Manuais