Day 5 Flashcards
An algorithm created by the NSA to implement non-repudiation.
DSA
Digital Signature Algorithm
High-speed Internet conductivity based upon existing infrastructure for telephones.
DSL
Digital Subscriber Line
A derivative of PPP used by wired and wireless networks to validate connections.
EAP
Extensible Authentication Protocol
A mode of symmetric encryption that divides the message into each block and encrypts them separately.
ECB
Electronic Code Book
An algorithm commonly used for key exchange that relies upon geometric complexities.
ECC
Elliptic Curve Cryptography
Used to negotiate a temporary shared secret using a public and private key.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
This signing technique employs the complexities of geometry, instead of factoring prime numbers.
ECDSA
Elliptic Curve Digital Signature Algorithm
An intranet technology designed to protect access to the infrastructure, identify threats and quarantine known offenders.
EDR
Endpoint Detection and Response
Typically referenced as a percentage value indicating value lost from one attack.
EF
Exposure Factor
A cryptosystem built into Microsoft that allows selective encryption.
EFS
Encrypted File System
A programming concept that points an application to the bottom or next step in execution.
EIP
Extended Instruction Pointer
Typically associated with accidental radiation of signals that interfere with IT systems.
EMI
Electromagnetic Interference
Large and significant discharge of signals that can create a denial of service in transmission and storage.
EMP
Electro Magnetic Pulse
This term identifies when a product has reached the end of its useful life according to the vendor.
EOL
End of Life
This term identifies when a product has reached the end of its useful life and is no longer patched or fixed or maintained.
EOSL
End of Service Life