Glossary E-F Flashcards
(43 cards)
EAP (Extensible Authentication Protocol)
Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication.
EAP-FAST (EAP Flexible Authentication via Secure Tunneling)
An EAP method that is expected to address the shortcomings of LEAP.
EAPoL (Extensible Authentication Protocol over LAN)
A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.
EAPoL (Extensible Authentication Protocol over LAN)
A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.
EAP-TLS (EAP Transport Layer Security)
An EAP method that requires server-side and client-side certificates for authentication using SSL/ TLS.
EAP-TTLS (EAP Tunneled Transport Layer Security)
An EAP method that enables a client and server to establish a secure connection without mandating a client-side certificate.
east-west traffic
Design paradigm accounting for the fact that data center traffic between servers is greater than that passing in and out (north-south).
ECC (elliptic curve cryptography)
An asymmetric encryption algorithm that leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.
edge computing
Provisioning processing resource close to the network edge of IoT devices to reduce latency.
e-discovery
Procedures and tools to collect, preserve, and analyze digital evidence.
EDR (endpoint detection and response)
A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.
EF (exposure factor)
In risk calculation, the percentage of an asset’s value that would be lost during a security incident or disaster scenario.
elasticity
The property by which a computing environment can instantly react to both increasing and decreasing demands in workload.
entropy
A measure of disorder. Cryptographic systems should exhibit high entropy to better resist brute force attacks.
EOL (end of life)
Product life cycle phase where sales are discontinued and support options reduced over time.
EOSL (end of service life)
Product life cycle phase where support is no longer available from the vendor.
EPP (endpoint protection platform)
A software agent and monitoring system that performs multiple security tasks.
ERM (enterprise risk management)
The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an organization.
error handling
Coding methods to anticipate and deal with exceptions thrown during execution of a process.
escrow
In key management, the storage of a backup key with a third party.
ESP (Encapsulating Security Protocol)
IPSec sub-protocol that enables encryption and authentication of the header and payload of a data packet.
evil twin
A wireless access point that deceives users into believing that it is a legitimate network access point.
execution control
The process of determining what additional software may be installed on a client or server beyond its baseline to prevent the use of unauthorized software.
exploitation framework
Suite of tools designed to automate delivery of exploits against common software and firmware vulnerabilities.