ACC SHELL

Path : /usr/share/gnome/help/opensuse-manuals/C/
File Upload :
Current File : //usr/share/gnome/help/opensuse-manuals/C/cha.apparmor.glossary.html

<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 28. AppArmor Glossary</title><link rel="stylesheet" href="susebooks.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="Documentation"><link rel="up" href="part.apparmor.html" title="Part IV. Confining Privileges with Novell AppArmor"><link rel="prev" href="cha.apparmor.support.html" title="Chapter 27. Support"><link rel="next" href="bk06apa.html" title="Appendix A. GNU Licenses"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> &gt; </span><a href="book.security.html">Security Guide</a><span class="breadcrumbs-sep"> &gt; </span><a href="part.apparmor.html">Confining Privileges with Novell AppArmor</a><span class="breadcrumbs-sep"> &gt; </span><strong><a accesskey="p" title="Chapter 27. Support" href="cha.apparmor.support.html"><span>&#9664;</span></a> </strong></p></div></td></tr></table></div><div class="chapter" title="Chapter 28. AppArmor Glossary"><div class="titlepage"><div><div><h2 class="title"><a name="cha.apparmor.glossary"></a>Chapter 28. AppArmor Glossary<span class="permalink"><a alt="Permalink" title="Copy Permalink" href="#cha.apparmor.glossary">¶</a></span></h2></div></div></div><div class="variablelist"><dl><dt><span class="term">Apache</span></dt><dd><p>
     Apache is a freely-available UNIX-based Web server. It is currently the
     most commonly used Web server on the Internet. Find more information
     about Apache at the Apache Web site at
     <a class="ulink" href="http://www.apache.org" target="_top">http://www.apache.org</a>.
    </p></dd><dt><span class="term">application firewalling</span></dt><dd><p>
     Novell AppArmor contains applications and limits the actions they are permitted
     to take. It uses privilege confinement to prevent attackers from using
     malicious programs on the protected server and even using trusted
     applications in unintended ways.
    </p></dd><dt><span class="term">attack signature</span></dt><dd><p>
     Pattern in system or network activity that alerts of a possible virus
     or hacker attack. Intrusion detection systems might use attack
     signatures to distinguish between legitimate and potentially malicious
     activity.
    </p><p>
     By not relying on attack signatures, Novell AppArmor provides "proactive" instead
     of "reactive" defense from attacks. This is better because there is no
     window of vulnerability where the attack signature must be defined for
     Novell AppArmor as it does for products using attack signatures to secure their
     networks.
    </p></dd><dt><span class="term">GUI</span></dt><dd><p>
     Graphical user interface. Refers to a software front-end meant to
     provide an attractive and easy-to-use interface between a computer user
     and application. Its elements include such things as windows, icons,
     buttons, cursors, and scroll bars.
    </p></dd><dt><span class="term">globbing</span></dt><dd><p>
     Filename substitution.
    </p></dd><dt><span class="term">HIP</span></dt><dd><p>
     Host intrusion prevention. Works with the operating system kernel to
     block abnormal application behavior in the expectation that the
     abnormal behavior represents an unknown attack. Blocks malicious
     packets on the host at the network level before they can
     <span class="quote">&#8220;<span class="quote">hurt</span>&#8221;</span> the application they target.
    </p></dd><dt><span class="term">mandatory access control</span></dt><dd><p>
     A means of restricting access to objects that is based on fixed
     security attributes assigned to users, files, and other objects. The
     controls are mandatory in the sense that they cannot be modified by
     users or their programs.
    </p></dd><dt><span class="term">profile foundation classes</span></dt><dd><p>
     Profile building blocks needed for common application activities, such
     as DNS lookup and user authentication.
    </p></dd><dt><span class="term">RPM</span></dt><dd><p>
     The RPM Package Manager. An open packaging system available for anyone
     to use. It works on Red Hat Linux,
     <span>openSUSE</span>,
     and other Linux and UNIX systems. It is capable of installing,
     uninstalling, verifying, querying, and updating computer software
     packages. See <a class="ulink" href="http://www.rpm.org/" target="_top">http://www.rpm.org/</a> for more
     information.
    </p></dd><dt><span class="term">SSH</span></dt><dd><p>
     Secure Shell. A service that allows you to access your server from a
     remote computer and issue text commands through a secure connection.
    </p></dd><dt><span class="term">streamlined access control</span></dt><dd><p>
     Novell AppArmor provides streamlined access control for network services by
     specifying which files each program is allowed to read, write, and
     execute. This ensures that each program does what it is supposed to do
     and nothing else.
    </p></dd><dt><span class="term">URI</span></dt><dd><p>
     Universal resource identifier. The generic term for all types of names
     and addresses that refer to objects on the World Wide Web. A URL is one
     kind of URI.
    </p></dd><dt><span class="term">URL</span></dt><dd><p>
     Uniform Resource Locator. The global address of documents and other
     resources on the World Wide Web.
    </p><p>
     The first part of the address indicates what protocol to use and the
     second part specifies the IP address or the domain name where the
     resource is located.
    </p><p>
     For example, in <code class="literal">http://www.novell.com</code>, http is the
     protocol to use.
    </p></dd><dt><span class="term">vulnerabilities</span></dt><dd><p>
     An aspect of a system or network that leaves it open to attack.
     Characteristics of computer systems that allow an individual to keep it
     from correctly operating or that allows unauthorized users to take
     control of the system. Design, administrative, or implementation
     weaknesses or flaws in hardware, firmware, or software. If exploited, a
     vulnerability could lead to an unacceptable impact in the form of
     unauthorized access to information or the disruption of critical
     processing.
    </p></dd></dl></div></div><div class="navfooter"><table width="100%" summary="Navigation footer" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> &gt; </span><a href="book.security.html">Security Guide</a><span class="breadcrumbs-sep"> &gt; </span><a href="part.apparmor.html">Confining Privileges with Novell AppArmor</a><span class="breadcrumbs-sep"> &gt; </span><strong><a accesskey="p" title="Chapter 27. Support" href="cha.apparmor.support.html"><span>&#9664;</span></a> </strong></p></div></td></tr></table></div></body></html>

ACC SHELL 2018