Day 5 Reversed Flashcards
DSA
Digital Signature Algorithm
An algorithm created by the NSA to implement non-repudiation.
DSL
Digital Subscriber Line
High-speed Internet conductivity based upon existing infrastructure for telephones.
EAP
Extensible Authentication Protocol
A derivative of PPP used by wired and wireless networks to validate connections.
ECB
Electronic Code Book
A mode of symmetric encryption that divides the message into each block and encrypts them separately.
ECC
Elliptic Curve Cryptography
An algorithm commonly used for key exchange that relies upon geometric complexities.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
Used to negotiate a temporary shared secret using a public and private key.
ECDSA
Elliptic Curve Digital Signature Algorithm
This signing technique employs the complexities of geometry, instead of factoring prime numbers.
EDR
Endpoint Detection and Response
An intranet technology designed to protect access to the infrastructure, identify threats and quarantine known offenders.
EF
Exposure Factor
Typically referenced as a percentage value indicating value lost from one attack.
EFS
Encrypted File System
A cryptosystem built into Microsoft that allows selective encryption.
EIP
Extended Instruction Pointer
A programming concept that points an application to the bottom or next step in execution.
EMI
Electromagnetic Interference
Typically associated with accidental radiation of signals that interfere with IT systems.
EMP
Electro Magnetic Pulse
Large and significant discharge of signals that can create a denial of service in transmission and storage.
EOL
End of Life
This term identifies when a product has reached the end of its useful life according to the vendor.
EOSL
End of Service Life
This term identifies when a product has reached the end of its useful life and is no longer patched or fixed or maintained.