E Flashcards
EAP
Extensible Authentication Protocol
A derivative of PPP (Point-to-Point Protocol) used by wired and wireless
networks to validate connections.
ECB
Electronic Code Book
A mode of symmetric encryption that divides the
message into each block and encrypts them separately.
ECC
Elliptic Curve Cryptography
An algorithm commonly used for key exchange that
relies upon geometric complexities.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
Used to negotiate a temporary shared secret using a
public and private key.
ECDSA
Elliptic Curve Digital Signature Algorithm
This signing technique employs the complexities of
geometry, instead of factoring prime numbers.
EDR
Endpoint Detection and Response
An intranet technology designed to protect access to the
infrastructure, identify threats and quarantine known
offenders.
EF
Exposure Factor
Typically referenced as a percentage value indicating
value lost from one attack.
EFS
Encrypted File System
A cryptosystem built into Microsoft that allows
selective encryption.
EIP
Extended Instruction Pointer
A programming concept that points an application to the
bottom or next step in execution.
EMI
Electromagnetic Interference
Typically associated with accidental radiation of signals
that interfere with IT systems.
EMP
Electro Magnetic Pulse
Large and significant discharge of signals that can
create a denial of service in transmission and storage.
EOL
End of Life
This term identifies when a product has reached the end
of its useful life according to the vendor.
EOSL
End of Service Life
This term identifies when a product has reached the end
of its useful life and is no longer patched or fixed or
maintained.
ERP
Enterprise Resource Planning
Business process management integrated into multiple
aspects of an organization, it services, and human
resources.
ESP
Encapsulated Security Payload
A header used in IPSEC to create confidentiality.