Glossary
Product-related terms
| Term | Description |
|---|---|
| SHIELD Gate | A web security solution based on Remote Browser Isolation (RBI) technology. It hosts the user's web browsing session on the server to protect against online threats. |
| SHIELD Viewer | A dedicated viewer that provides a secure preview when downloading files. Supports read-only document viewing functionality. |
| SHIELD Drive | The file storage feature of SHIELD Gate. A storage system that safely keeps downloaded files in an isolated environment. |
| Edge server | A server that supports the establishment of local storage for internal protection. Key elements of a file storage-based architecture. |
Security technology terminology
| Term | Description |
|---|---|
| RBI (Remote Browser Isolation) | Remote browser isolation. A security technology that executes web browsing sessions on a remote server to isolate the local system from threats. |
| CDR (Content Disarm and Reconstruction) | Document sanitization technology. It removes malware or threats from files and reconstructs them into a safe form for delivery. |
| Isolated Browser | Remote browser running on the server. Provides an isolated environment to prevent web content from being directly stored on the user's local PC. |
| Screen marking | A feature that displays user identification information in the form of a watermark on the screen to ensure traceability in case of information leakage. |
Access and Authentication Terms
| Term | Description |
|---|---|
| SSO (Single Sign-On) | Single Sign-On (SSO). An authentication method that allows access to multiple systems with a single login. Used in conjunction with internal accounts. |
| AD (Active Directory) | Microsoft's directory service. Used for managing user accounts and permissions, and can be integrated with SHIELD Gate. |
| OTP (One-Time Password) | One-time password. A time-based or event-based password used for additional security authentication. |
| RBAC (Role-Based Access Control) | Role-based access control. A method of granting system access permissions based on the user's role. |
| WOL (Wake On LAN) | Technology to remotely power on a PC that is turned off via the network. Used for desktop remote access. |
Policy-related terms
| Term | Description |
|---|---|
| Conditional Policy | Access control policies that are applied differently based on specific conditions such as user location, time, device, and group. |
| Priority | A value that determines the order of policy application. The lower the number, the earlier it is applied, and in case of a conflict, the more restrictive policy is applied last. |
| Web Category | Groups of URLs classified by their nature (e.g., shopping, social media, finance, etc.). You can set access allow/block policies by category. |
| Wildcard | Special character (*) used for URL pattern matching. Used before the domain to match all URLs including subdomains. |
| Regular Expression (Regex) | Expression for finding strings of a specific pattern. Used for detecting sensitive information (e.g., resident registration numbers, account numbers). |
| Expiration Date | Start and end dates of the policy. It can be set to activate the policy only during the specified period. |
Network Terms
| Term | Description |
|---|---|
| PAC (Proxy Auto-Config) | Proxy auto-configuration file. A script that automatically determines which proxy to use when the browser accesses a specific URL. |
| DNS (Domain Name System) | A system that converts domain names to IP addresses. In the RBI environment, DNS queries are performed on an isolated server. |
| Protocol | Network communication protocols. HTTP and HTTPS are separately distinguished for policy application. |
| VDI (Virtual Desktop Infrastructure) | Virtual Desktop Infrastructure. A technology that provides virtual desktops from a server. |
File-related terms
| Term | Description |
|---|---|
| extension | The suffix after the file name that indicates the file format (e.g., .pdf, .xlsx, .docx). Upload/download control is possible by file extension. |
| Clipboard | Temporary storage area used for copy/paste functionality. Clipboard usage between PC and remote browser can be controlled by policy. |
| Isolated Storage | An isolated storage space where downloaded files are saved. They are stored in the designated storage instead of being saved directly on the local PC. |
| Trash can | A space where deleted files are temporarily stored. They are automatically deleted after a certain period (default 30 days) and can be restored before that. |
| Encryption | A process that transforms files using a special algorithm to ensure safe protection. Automatic encryption can be performed during upload. |
User Interface Terms
| Term | Description |
|---|---|
| App | Icon or shortcut to access the business system (ERP, groupware, etc.) registered by the administrator. |
| URL input field (address bar) | An input field where users can directly enter a web address to access the site. |
| GNB (Global Navigation Bar) | Global navigation bar. A top menu that displays a list of recently accessed apps/URLs and supports quick access. |
| Top bar | Menu and control area at the top of the screen. Supports full-screen view through hide/show functionality. |
| Lock screen | A guide page displayed when access is blocked by policy. Customizable. |
Collaboration and Integration Terms
| Term | Description |
|---|---|
| M365 (Microsoft 365) | Microsoft's cloud-based productivity platform. Includes Teams, Office365, Word, PowerPoint, etc. |
| Teams | Microsoft's collaboration tool. Supports viewing, uploading, and editing files within the Teams app at SHIELD Gate. |
| Collaborative editing | A feature that allows multiple users to edit a single document simultaneously. Supported by MS365, Google Docs, etc. |
| Google Docs | Google's cloud-based document editing tool. Provides real-time collaborative editing features. |
| Hancom Web | A web-based document editing solution from Hancom. You can view and edit hwp/hwpx files online. |
| NAS (Network Attached Storage) | Network-connected storage device. Can be linked to external storage. |
| OneDrive | Microsoft's cloud storage service |
| Google Drive | Google's cloud storage service |
Remote Access Terms
| Term | Description |
|---|---|
| SSH (Secure Shell) | Network protocol for secure remote access. Supports command execution and file transfer. |
| SFTP (SSH File Transfer Protocol) | SSH-based secure file transfer protocol |
| Terminal | A text-based interface that allows you to control the system by entering commands. |
| Remote Console | A console interface that allows remote access and management of web servers, etc. |
Logging and Monitoring Terms
| Term | Description |
|---|---|
| log | Data that records system and user activities. Includes history of login/logout, file downloads, policy modifications, etc. |
| Session | The duration of access from the time the user logs in until they log out or are automatically logged out. |
| Timeout | A feature that automatically ends the session when there is no user activity for a certain period of time. |
| Dashboard | A management screen that visually displays key indicators and statistics. Monitors access status, website categories, and more. |
| Archive | A file that has been compressed and stored for long-term log retention. |
| Integrity Verification | The process of verifying that log data has not been tampered with. |
Technical terms
| Term | Description |
|---|---|
| WebGL | JavaScript API for rendering 3D graphics in web browsers |
| Cache | A memory area that temporarily stores frequently used data to improve performance. |
| Cookie | A small data file that the website stores in the user's browser. Used for keeping the login status, etc. |
| Session Information | Server-side data to maintain the user's connection status. |
| Endpoint Broker | Technology that supports web applications requiring internal PC communication (such as banking security programs). |
Management Terms
| Term | Description |
|---|---|
| License | Product usage permissions. Can be assigned automatically or manually depending on the number of users. |
| Inbound Provisioning | A feature that automatically synchronizes user information from external systems (Microsoft 365, SCI Server, etc.) |
| Scheduling | A feature that allows you to schedule a specific task to run automatically at a designated time. |
| Policy Group | A bundle of users who are subject to the same policy. Group creation and management according to organizational structure. |
| CSV | Comma-separated values format file. Used for bulk user registration. |
| Activate/Deactivate | Availability status of the user account. Access to the service is not possible when deactivated. |