Back to Barracuda Email Security Gateway
Glossary
- dashboard
-
Main page of many Barracuda Networks product interfaces, providing a summary of the system. Formerly known as the Status tab.
- data center
-
A facility used to house computer systems and associated components, such as telecommunications and storage systems.
- data truncation
-
Occurs when data or a data stream is stored in a location too short to hold its entire length. May occur automatically, such as when a long string is written to a smaller buffer, or deliberately, when only a portion of the data is wanted.
- datasheet
-
Document that summarizes the performance and other technical characteristics of a product, machine, component (e.g., an electronic component), material, a subsystem (e.g., a power supply) or software in sufficient detail to be used by a design engineer to integrate the component into a system.
- DCE-RPC
-
Remote procedure call system that allows programmers to write distributed software without having to worry about the underlying network code.
- DDoS
-
A Distributed Denial of Service is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to users by temporarily or indefinitely disrupting services of a host connected to the Internet, using more than one, often thousands of, unique IP addresses.
- dedicated host
-
An Internet hosting option where an organization leases an entire server, fully dedicated to their use. This is also an option in the public cloud. The price for a Dedicated Host varies by instance family, region, and payment option.
- dedicated instance
-
Amazon EC2 instance that runs on single-tenant hardware dedicated to a single customer.
- dedicated reserved instance
-
An option you can purchase from a cloud vendor to guarantee that sufficient capacity will be available to launch Dedicated Instances into a virtual private cloud (VPC).
- demilitarized zone
-
A physical or logical sub-network that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN). An external network node has direct access only to equipment in the DMZ, rather than to any other part of the network.
- dictionary attack
-
A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by systematically entering every word in the dictionary.
- direct server return
-
An option associated with a destination server that allows for increased outbound traffic throughput when performing sustained uploads, such as streamed audio or visual media.
- DKIM
-
An email authentication method designed to detect email spoofing. It enables an email recipient to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain. This protocol attempts to prevent the use of forged sender addresses in emails, a technique often used in phishing and email spam.
- DMARC
-
An email-validation system designed to detect and prevent email spoofing. DMARC helps to counter certain phishing and spam email exploits, such as using false sender addresses in email messages that appear to originate from legitimate organizations. It counters the illicit usage of the exact domain name in the From: field of email message headers. DMARC is built on top of SPF and DKIM. You must have both an SPF and a DKIM record published for the domain to set DMARC policies.
- DNS
-
Distributed database that translates domain names, like www.example.com, into unique IP address.
- DNS Cache
-
A temporary database, maintained by a computer's operating system, that contains records of all recent visits and attempted visits to websites and other Internet domains.
- DNS record
-
Database record used to map a URL to an IP address.
- DNS reputation filtering
-
Filtering mail traffic based on a DNS reputation database. Used by the Spam Filter service (blacklist, DNSBL).
- Docker
-
Open-source software that automates the deployment of applications inside virtualized software containers.
- Docker image
-
A layered file system template that is the basis of a Docker container. Docker images can comprise specific operating systems or applications.
- DomainKeys Identified Mail
-
Email authentication method designed to detect email spoofing.
- DoS attack
-
A cyber-attack where the perpetrator seeks to make a computer or network resource unavailable to users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of Service attacks are typically accomplished by flooding the target with superfluous requests in an attempt to overload systems and prevent legitimate requests from being fulfilled. See also Distributed Denial of Service or DDoS.
- dynamic path selection
-
Term used in context with Traffic Intelligence (TI). Using dynamic path selection, the session is balanced depending on the amount of traffic.
- dynamic routing
-
Routing that adjusts automatically to network topology or traffic changes. Also called adaptive routing.
- DynamoDB
-
A fully managed Amazon NoSQL database service that provides fast and predictable performance with seamless scalability.
- EC2
-
Forms a central part of AWS by allowing users to rent virtual computers on which to run their own computer applications.
- edge location
-
Used by the AWS service CloudFront. Feature that offers content to end users via geographically closer locations to improve their experience.
- EGP
-
Internet protocol for exchanging routing information between autonomous systems.
- Elastic Beanstalk
-
A web service for deploying and managing applications in the AWS cloud without worrying about the infrastructure that runs those applications.
- elastic computing
-
The ability to dynamically provision and deprovision computing and storage resources to stretch to the demands of peak usage, without the need to worry about capacity planning and engineering around uneven usage patterns.
- Elastic IP address
-
A static public IP address that belongs to an AWS account. Can be associated with an instance to make it accessible from the Internet. The Elastic IP is natted/mapped by AWS to the private IP.
- email continuity
-
Email failover system that allows email communication to continue during mail server outage.
- email encryption
-
Encrypting email messages to prevent their content by being read by anyone other than the intended recipient.
- encrypt
-
To convert information or data into a cipher or code, especially to prevent unauthorized access. Antonym: unencrypt.
- Energize Updates
-
Provides Barracuda Networks products with protection from the latest Internet threats. These updates are sent out hourly, or more frequently if needed, to ensure that appliances always have the latest and most comprehensive protection. Barracuda Energize Updates subscriptions must be purchased with any Barracuda Networks appliance. Includes basic support, firmware maintenance, security updates, and early release firmware.
- envelope encryption
-
The use of a master key and a data key to algorithmically protect data. The master key is used to encrypt and decrypt the data key and the data key is used to encrypt and decrypt the data itself.
- Ethernet
-
Local area network technology that uses special twisted pair or fiber optical cables. As per the OSI model, Ethernet provides services up to and including the data link layer.
- EULA
-
Contract between the Barracuda and the purchaser, establishing the purchaser's right to use Barracuda software.
- evasion
-
Bypassing an information security device in order to deliver an exploit, attack, or other form of malware to a target network or system, without detection.
- exploit
-
The use of software, data, or commands to 'exploit' a weakness in a computer system or program to carry out some form of malicious intent, such as a denial-of-service attack, Trojan horses, worms, or viruses.
- external blocklist services
-
Lists of IP addresses from which potential spam originates.
- false positive
-
A result that indicates a given condition is present, when it is not.
- firmware
-
Model version of a Barracuda Networks product.
- flooding
-
A Denial of Service (DoS) attack that is designed to bring a network or service down by flooding it with large amounts of traffic.
- Flow Logs
-
AWS service that enables you to capture information about the IP traffic going to and from network interfaces in a VPC.
- forensics
-
Techniques of examining digital media with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital information.
- FQDN
-
The Fully Qualified Domain Name includes host name, as well as all enclosing domains, and is often distinguished by the use of a terminating dot: (host.subdomain.domain.).
- front end
-
The front end is responsible for collecting input in various forms from the user.
- front-end server
-
The front-end server is an extension of the back-end server and is designed to provide scalability.
- FTP proxy
-
Allows the proxy to control FTP traffic. When a client uploads or downloads files, the proxy identifies the traffic as FTP, allowing the appliance to control file transfers using TCP optimization and caching.