E Flashcards
EAP
Extensible Authentication Protocol
An authentication framework that allows for the use of different authentication methods for secure network access technologies. It provides some common functions and negotiation of authentication methods.
Often used in wireless and point-to-point connections.
ECB
Electronic Code Book
The simplest and weakest AES block cipher mode. It uses no initialization vector or chaining.
ECC
Elliptic Curve Cryptography
A public-key (asymmetric) encryption technique that uses elliptic curve theory to create cryptographic keys that are faster, smaller, more secure, and more efficient.
It is based on the algebraic structure of elliptic curves and uses mathematics to generate security between key pairs.
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
A variant of the DHE key exchange that uses elliptic curve cryptography to provide stronger security with smaller key sizes.
ECDSA
Elliptic Curve Digital Signature Algorithm
A Digital Signature Algorithm which uses keys derived from elliptic curve cryptography (ECC). It makes more efficient keys.
EDR / EDTR
Endpoint Detection and Response
Endpoint Detection and Threat Response
A cybersecurity technology that monitors devices (endpoints) for threats and responds to them.
EFS
Encrypted File System
A security feature in Microsoft Windows that encrypts files and folders to protect confidential data from attackers.
It is a user-based encryption control that uses public-key encryption to generate a certificate for each user who requests encryption. The user’s private key is stored in their profile, while the public key is stored with the encrypted files. Only the user with the private key can decrypt the file.
ERP
Enterprise Resource Planning
A software system that helps businesses manage and automate core processes to improve performance. It streamlines operations by integrate a company’s data into a single database, so other departments can access it.
It manages day-to-day activities like accounting, procurement, project management, supply chain operations, risk management, etc. It helps plan, budget, predict, and report on an organization’s financial results.
ESN
Electronic Serial Number
A unique identification number for a wireless phone that is embedded in the phone’s microchip by the manufacturer.
When a call is made by the phone, the ESN is sent to a base station, where the wireless carrier’s mobile switching office can validate the call and prevent fraud.
ESP
Encapsulated Security Payload
A protocol of IPsec that encrypts and authenticates packets using a VPN.
It provides data confidentiality, data origin authentication, data integrity checking, and replay protection.