Glossary- E Flashcards
E-1
A common carrier standard protocol for transporting voice and data. E-1 can sup- port up to 32 separate voice channels of 64 kbit/sec each and is used primarily in Europe.
E-3
A common carrier standard protocol for transporting voice and data. E-3 can support up to 512 separate voice channels of 64 kbit/sec each and is used primarily in Europe.
A network-based service used to transmit messages between individuals and groups.
eavesdropping
The act of secretly intercepting and recording a voice or data transmission.
electric generator
A system consisting of an internal combustion engine powered by gasoline, diesel fuel, or natural gas that spins an electric generator. A generator can sup- ply electricity for as long as several days, depending upon the size of its fuel supply and whether it can be refueled.
electrically erasable programmable read-only memory (EEPROM)
A form of per- manent memory that can be rewritten using a special program on the computer that it is installed on.
elliptic curve
A public key cryptography algorithm.
embedded audit module (EAM)
A continuous auditing technique that consists of a special software module embedded within a system that is designed to detect process- ing anomalies.
emergency communications plan
The communications that are required during a disaster. See also response document.
emergency response
The urgent activities that immediately follow a disaster, including evacuation of personnel, first aid, triage of injured personnel, and possibly firefighting.
employee handbook
See employee policy manual.
employee policy manual
A formal statement of the terms of employment, facts about
the organization, benefits, compensation, conduct, and policies.
employment agreement
A legal contract between an organization and an employee, which may include a description of duties, roles and responsibilities, confidentiality, compliance, and termination.
encapsulation
A practice where a method can call on another method to help per- form its work. See also method.
encryption
The act of hiding sensitive information in plain sight. Encryption works by scrambling the characters in a message, using a method known only to the sender and receiver, making the message useless to anyone who intercepts the message.
encryption key
A block of characters, used in combination with an encryption algo- rithm, to encrypt or decrypt a stream or block of data.
enhanced interior gateway routing protocol (EIGRP)
A TCP/IP routing protocol that is used to transmit network routing information from one network router to an- other in order to determine the most efficient path through a large network.
enterprise architecture
Activities that ensure important business needs are met by IT systems; the model that is used to map business functions into the IT environment and IT systems in increasing levels of detail.
erasable programmable read-only memory (EPROM)
A form of permanent memo- ry that can be erased by shining ultraviolet (UV) light through a quartz window on the top of the chip.
error handling
Functions that are performed when errors in processing are encountered.
espionage
The act of spying on an organization.
Ethernet
A standard protocol for assembling a stream of data into frames for trans- port over a physical medium from one station to another on a local area network. On an Ethernet network, any station is free to transmit a packet at any time, provided that another station is not already doing so.
evacuation procedure
nstructions to safely evacuate a work facility in the event of a fire, earthquake, or other disaster.
evidence
Information gathered by the auditor that provides proof that a control exists and is being operated.
expected error rate
An estimate that expresses the percent of errors or exceptions that may exist in an entire population.
exposure factor (EF)
The financial loss that results from the realization of a threat, expressed as a percentage of the asset’s total value.