Day 5 Reversed Flashcards
DSA
Digital Signature Algorithm
An algorithm created by the NSA to implement non-repudiation.
DSL
Digital Subscriber Line
High-speed Internet conductivity based upon existing infrastructure for telephones.
EAP
Extensible Authentication Protocol
A derivative of PPP used by wired and wireless networks to validate connections.
ECB
Electronic Code Book
A mode of symmetric encryption that divides the message into each block and encrypts them separately.
ECC
Elliptic Curve Cryptography
An algorithm commonly used for key exchange that relies upon geometric complexities.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
Used to negotiate a temporary shared secret using a public and private key.
ECDSA
Elliptic Curve Digital Signature Algorithm
This signing technique employs the complexities of geometry, instead of factoring prime numbers.
EDR
Endpoint Detection and Response
An intranet technology designed to protect access to the infrastructure, identify threats and quarantine known offenders.
EF
Exposure Factor
Typically referenced as a percentage value indicating value lost from one attack.
EFS
Encrypted File System
A cryptosystem built into Microsoft that allows selective encryption.
EIP
Extended Instruction Pointer
A programming concept that points an application to the bottom or next step in execution.
EMI
Electromagnetic Interference
Typically associated with accidental radiation of signals that interfere with IT systems.
EMP
Electro Magnetic Pulse
Large and significant discharge of signals that can create a denial of service in transmission and storage.
EOL
End of Life
This term identifies when a product has reached the end of its useful life according to the vendor.
EOSL
End of Service Life
This term identifies when a product has reached the end of its useful life and is no longer patched or fixed or maintained.
ERP
Enterprise Resource Planning
Business process management integrated into multiple aspects of an organization, IT Services, and Human Resources.
ESP
Encapsulated Security Payload
A header used in IPSEC to create confidentiality.
ESN
Electronic Serial Number
An identifying number created by the Federal Communications Commission to uniquely identify mobile devices and radios.
FACL
File System Access Control List
This is creating filters or restrictions on disk storage.
FAR
False Acceptance Rate
When biometrics malfunction, incorrectly granting permissions.
FDE
Full Disk Encryption
Enforcing confidentiality across the entire storage device.
FIM
File Integrity Monitoring
A defensive control designed to assess or validate the integrity of files, such as Tripwire.
FPGA
Field Programmable Gate Array
An integrated circuit or chip that may be revised or configured after manufacture.
FRR
False Rejection Rate
A biometric measurement, indicating the rate at which authorized personnel are forbidden access.
FTP
File Transfer Protocol
A file management application designed to insecurely upload and download files.
FTPS
File transfer Protocol - Secure
A relative of HTTPS implemented in the same way with certificates and key exchange.
Full BU
Full Backup
It moves files to alternative media that regardless of whether the archive bit is set, and then it clears it.