Glossary E-F Flashcards
EAP (Extensible Authentication Protocol)
Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication.
EAP-FAST (EAP Flexible Authentication via Secure Tunneling)
An EAP method that is expected to address the shortcomings of LEAP.
EAPoL (Extensible Authentication Protocol over LAN)
A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.
EAPoL (Extensible Authentication Protocol over LAN)
A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.
EAP-TLS (EAP Transport Layer Security)
An EAP method that requires server-side and client-side certificates for authentication using SSL/ TLS.
EAP-TTLS (EAP Tunneled Transport Layer Security)
An EAP method that enables a client and server to establish a secure connection without mandating a client-side certificate.
east-west traffic
Design paradigm accounting for the fact that data center traffic between servers is greater than that passing in and out (north-south).
ECC (elliptic curve cryptography)
An asymmetric encryption algorithm that leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.
edge computing
Provisioning processing resource close to the network edge of IoT devices to reduce latency.
e-discovery
Procedures and tools to collect, preserve, and analyze digital evidence.
EDR (endpoint detection and response)
A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.
EF (exposure factor)
In risk calculation, the percentage of an asset’s value that would be lost during a security incident or disaster scenario.
elasticity
The property by which a computing environment can instantly react to both increasing and decreasing demands in workload.
entropy
A measure of disorder. Cryptographic systems should exhibit high entropy to better resist brute force attacks.
EOL (end of life)
Product life cycle phase where sales are discontinued and support options reduced over time.
EOSL (end of service life)
Product life cycle phase where support is no longer available from the vendor.
EPP (endpoint protection platform)
A software agent and monitoring system that performs multiple security tasks.