ACC SHELL
<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 28. AppArmor Glossary</title><link rel="stylesheet" href="susebooks.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="Documentation"><link rel="up" href="part.apparmor.html" title="Part IV. Confining Privileges with Novell AppArmor"><link rel="prev" href="cha.apparmor.support.html" title="Chapter 27. Support"><link rel="next" href="bk06apa.html" title="Appendix A. GNU Licenses"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> > </span><a href="book.security.html">Security Guide</a><span class="breadcrumbs-sep"> > </span><a href="part.apparmor.html">Confining Privileges with Novell AppArmor</a><span class="breadcrumbs-sep"> > </span><strong><a accesskey="p" title="Chapter 27. Support" href="cha.apparmor.support.html"><span>◀</span></a> </strong></p></div></td></tr></table></div><div class="chapter" title="Chapter 28. AppArmor Glossary"><div class="titlepage"><div><div><h2 class="title"><a name="cha.apparmor.glossary"></a>Chapter 28. AppArmor Glossary<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#cha.apparmor.glossary">¶</a></span></h2></div></div></div><div class="variablelist"><dl><dt><span class="term">Apache</span></dt><dd><p>
Apache is a freely-available UNIX-based Web server. It is currently the
most commonly used Web server on the Internet. Find more information
about Apache at the Apache Web site at
<a class="ulink" href="http://www.apache.org" target="_top">http://www.apache.org</a>.
</p></dd><dt><span class="term">application firewalling</span></dt><dd><p>
Novell AppArmor contains applications and limits the actions they are permitted
to take. It uses privilege confinement to prevent attackers from using
malicious programs on the protected server and even using trusted
applications in unintended ways.
</p></dd><dt><span class="term">attack signature</span></dt><dd><p>
Pattern in system or network activity that alerts of a possible virus
or hacker attack. Intrusion detection systems might use attack
signatures to distinguish between legitimate and potentially malicious
activity.
</p><p>
By not relying on attack signatures, Novell AppArmor provides "proactive" instead
of "reactive" defense from attacks. This is better because there is no
window of vulnerability where the attack signature must be defined for
Novell AppArmor as it does for products using attack signatures to secure their
networks.
</p></dd><dt><span class="term">GUI</span></dt><dd><p>
Graphical user interface. Refers to a software front-end meant to
provide an attractive and easy-to-use interface between a computer user
and application. Its elements include such things as windows, icons,
buttons, cursors, and scroll bars.
</p></dd><dt><span class="term">globbing</span></dt><dd><p>
Filename substitution.
</p></dd><dt><span class="term">HIP</span></dt><dd><p>
Host intrusion prevention. Works with the operating system kernel to
block abnormal application behavior in the expectation that the
abnormal behavior represents an unknown attack. Blocks malicious
packets on the host at the network level before they can
<span class="quote">“<span class="quote">hurt</span>”</span> the application they target.
</p></dd><dt><span class="term">mandatory access control</span></dt><dd><p>
A means of restricting access to objects that is based on fixed
security attributes assigned to users, files, and other objects. The
controls are mandatory in the sense that they cannot be modified by
users or their programs.
</p></dd><dt><span class="term">profile foundation classes</span></dt><dd><p>
Profile building blocks needed for common application activities, such
as DNS lookup and user authentication.
</p></dd><dt><span class="term">RPM</span></dt><dd><p>
The RPM Package Manager. An open packaging system available for anyone
to use. It works on Red Hat Linux,
<span>openSUSE</span>,
and other Linux and UNIX systems. It is capable of installing,
uninstalling, verifying, querying, and updating computer software
packages. See <a class="ulink" href="http://www.rpm.org/" target="_top">http://www.rpm.org/</a> for more
information.
</p></dd><dt><span class="term">SSH</span></dt><dd><p>
Secure Shell. A service that allows you to access your server from a
remote computer and issue text commands through a secure connection.
</p></dd><dt><span class="term">streamlined access control</span></dt><dd><p>
Novell AppArmor provides streamlined access control for network services by
specifying which files each program is allowed to read, write, and
execute. This ensures that each program does what it is supposed to do
and nothing else.
</p></dd><dt><span class="term">URI</span></dt><dd><p>
Universal resource identifier. The generic term for all types of names
and addresses that refer to objects on the World Wide Web. A URL is one
kind of URI.
</p></dd><dt><span class="term">URL</span></dt><dd><p>
Uniform Resource Locator. The global address of documents and other
resources on the World Wide Web.
</p><p>
The first part of the address indicates what protocol to use and the
second part specifies the IP address or the domain name where the
resource is located.
</p><p>
For example, in <code class="literal">http://www.novell.com</code>, http is the
protocol to use.
</p></dd><dt><span class="term">vulnerabilities</span></dt><dd><p>
An aspect of a system or network that leaves it open to attack.
Characteristics of computer systems that allow an individual to keep it
from correctly operating or that allows unauthorized users to take
control of the system. Design, administrative, or implementation
weaknesses or flaws in hardware, firmware, or software. If exploited, a
vulnerability could lead to an unacceptable impact in the form of
unauthorized access to information or the disruption of critical
processing.
</p></dd></dl></div></div><div class="navfooter"><table width="100%" summary="Navigation footer" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> > </span><a href="book.security.html">Security Guide</a><span class="breadcrumbs-sep"> > </span><a href="part.apparmor.html">Confining Privileges with Novell AppArmor</a><span class="breadcrumbs-sep"> > </span><strong><a accesskey="p" title="Chapter 27. Support" href="cha.apparmor.support.html"><span>◀</span></a> </strong></p></div></td></tr></table></div></body></html>
ACC SHELL 2018