Day 5 Flashcards
An algorithm created by the NSA to implement non-repudiation.
DSA
Digital Signature Algorithm
High-speed Internet conductivity based upon existing infrastructure for telephones.
DSL
Digital Subscriber Line
A derivative of PPP used by wired and wireless networks to validate connections.
EAP
Extensible Authentication Protocol
A mode of symmetric encryption that divides the message into each block and encrypts them separately.
ECB
Electronic Code Book
An algorithm commonly used for key exchange that relies upon geometric complexities.
ECC
Elliptic Curve Cryptography
Used to negotiate a temporary shared secret using a public and private key.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
This signing technique employs the complexities of geometry, instead of factoring prime numbers.
ECDSA
Elliptic Curve Digital Signature Algorithm
An intranet technology designed to protect access to the infrastructure, identify threats and quarantine known offenders.
EDR
Endpoint Detection and Response
Typically referenced as a percentage value indicating value lost from one attack.
EF
Exposure Factor
A cryptosystem built into Microsoft that allows selective encryption.
EFS
Encrypted File System
A programming concept that points an application to the bottom or next step in execution.
EIP
Extended Instruction Pointer
Typically associated with accidental radiation of signals that interfere with IT systems.
EMI
Electromagnetic Interference
Large and significant discharge of signals that can create a denial of service in transmission and storage.
EMP
Electro Magnetic Pulse
This term identifies when a product has reached the end of its useful life according to the vendor.
EOL
End of Life
This term identifies when a product has reached the end of its useful life and is no longer patched or fixed or maintained.
EOSL
End of Service Life
Business process management integrated into multiple aspects of an organization, IT Services, and Human Resources.
ERP
Enterprise Resource Planning
A header used in IPSEC to create confidentiality.
ESP
Encapsulated Security Payload
An identifying number created by the Federal Communications Commission to uniquely identify mobile devices and radios.
ESN
Electronic Serial Number
This is creating filters or restrictions on disk storage.
FACL
File System Access Control List
When biometrics malfunction, incorrectly granting permissions.
FAR
False Acceptance Rate
Enforcing confidentiality across the entire storage device.
FDE
Full Disk Encryption
A defensive control designed to assess or validate the integrity of files, such as Tripwire.
FIM
File Integrity Monitoring
An integrated circuit or chip that may be revised or configured after manufacture.
FPGA
Field Programmable Gate Array
A biometric measurement, indicating the rate at which authorized personnel are forbidden access.
FRR
False Rejection Rate
A file management application designed to insecurely upload and download files.
FTP
File Transfer Protocol
A relative of HTTPS implemented in the same way with certificates and key exchange.
FTPS
File transfer Protocol - Secure
It moves files to alternative media that regardless of whether the archive bit is set, and then it clears it.
Full BU
Full backup