McAfee® Host Intrusion Prevention 6.1 Product Guide

Glossary

SYN flood

A hacking technique used to cause a denial of service. SYN packets are sent from a client with a spoofed IP address and are sent at a rate faster than the TCP stack on the host can handle. As the client address is spoofed, the client sends no SYN-ACK, but continues to flood the host with SYN packets, tying up the resources of the host.

task

See client tasks, server tasks.

Trojan horse

A program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. Trojan horses are not technically viruses, because they do not replicate.

trusted application

An application that is known to be safe in an environment, has no known vulnerabilities, and is allowed to perform any operation.

tuning

The process of identifying a few profiles and creating policies for them in an effort to reduce the number of false positives and prevent generating events.

update package

Package files from McAfee that provide updates to a product. All packages are considered product updates with the exception of the product binary (Setup) files.

updating

The process of installing updates to existing products or upgrading to new versions of products.

zero-day attack

Exploit that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.

195

Page 195
Image 195
McAfee 6.1 manual 195, SYN flood