Glossary- E Flashcards
(26 cards)
E-1
A common carrier standard protocol for transporting voice and data. E-1 can sup- port up to 32 separate voice channels of 64 kbit/sec each and is used primarily in Europe.
E-3
A common carrier standard protocol for transporting voice and data. E-3 can support up to 512 separate voice channels of 64 kbit/sec each and is used primarily in Europe.
A network-based service used to transmit messages between individuals and groups.
eavesdropping
The act of secretly intercepting and recording a voice or data transmission.
electric generator
A system consisting of an internal combustion engine powered by gasoline, diesel fuel, or natural gas that spins an electric generator. A generator can sup- ply electricity for as long as several days, depending upon the size of its fuel supply and whether it can be refueled.
electrically erasable programmable read-only memory (EEPROM)
A form of per- manent memory that can be rewritten using a special program on the computer that it is installed on.
elliptic curve
A public key cryptography algorithm.
embedded audit module (EAM)
A continuous auditing technique that consists of a special software module embedded within a system that is designed to detect process- ing anomalies.
emergency communications plan
The communications that are required during a disaster. See also response document.
emergency response
The urgent activities that immediately follow a disaster, including evacuation of personnel, first aid, triage of injured personnel, and possibly firefighting.
employee handbook
See employee policy manual.
employee policy manual
A formal statement of the terms of employment, facts about
the organization, benefits, compensation, conduct, and policies.
employment agreement
A legal contract between an organization and an employee, which may include a description of duties, roles and responsibilities, confidentiality, compliance, and termination.
encapsulation
A practice where a method can call on another method to help per- form its work. See also method.
encryption
The act of hiding sensitive information in plain sight. Encryption works by scrambling the characters in a message, using a method known only to the sender and receiver, making the message useless to anyone who intercepts the message.
encryption key
A block of characters, used in combination with an encryption algo- rithm, to encrypt or decrypt a stream or block of data.
enhanced interior gateway routing protocol (EIGRP)
A TCP/IP routing protocol that is used to transmit network routing information from one network router to an- other in order to determine the most efficient path through a large network.
enterprise architecture
Activities that ensure important business needs are met by IT systems; the model that is used to map business functions into the IT environment and IT systems in increasing levels of detail.
erasable programmable read-only memory (EPROM)
A form of permanent memo- ry that can be erased by shining ultraviolet (UV) light through a quartz window on the top of the chip.
error handling
Functions that are performed when errors in processing are encountered.
espionage
The act of spying on an organization.
Ethernet
A standard protocol for assembling a stream of data into frames for trans- port over a physical medium from one station to another on a local area network. On an Ethernet network, any station is free to transmit a packet at any time, provided that another station is not already doing so.
evacuation procedure
nstructions to safely evacuate a work facility in the event of a fire, earthquake, or other disaster.
evidence
Information gathered by the auditor that provides proof that a control exists and is being operated.