Glossary E-F Flashcards

(43 cards)

1
Q

EAP (Extensible Authentication Protocol)

A

Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EAP-FAST (EAP Flexible Authentication via Secure Tunneling)

A

An EAP method that is expected to address the shortcomings of LEAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EAPoL (Extensible Authentication Protocol over LAN)

A

A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EAPoL (Extensible Authentication Protocol over LAN)

A

A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP-TLS (EAP Transport Layer Security)

A

An EAP method that requires server-side and client-side certificates for authentication using SSL/ TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EAP-TTLS (EAP Tunneled Transport Layer Security)

A

An EAP method that enables a client and server to establish a secure connection without mandating a client-side certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

east-west traffic

A

Design paradigm accounting for the fact that data center traffic between servers is greater than that passing in and out (north-south).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECC (elliptic curve cryptography)

A

An asymmetric encryption algorithm that leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

edge computing

A

Provisioning processing resource close to the network edge of IoT devices to reduce latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

e-discovery

A

Procedures and tools to collect, preserve, and analyze digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EDR (endpoint detection and response)

A

A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EF (exposure factor)

A

In risk calculation, the percentage of an asset’s value that would be lost during a security incident or disaster scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

elasticity

A

The property by which a computing environment can instantly react to both increasing and decreasing demands in workload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

entropy

A

A measure of disorder. Cryptographic systems should exhibit high entropy to better resist brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EOL (end of life)

A

Product life cycle phase where sales are discontinued and support options reduced over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EOSL (end of service life)

A

Product life cycle phase where support is no longer available from the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EPP (endpoint protection platform)

A

A software agent and monitoring system that performs multiple security tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ERM (enterprise risk management)

A

The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an organization.

19
Q

error handling

A

Coding methods to anticipate and deal with exceptions thrown during execution of a process.

20
Q

escrow

A

In key management, the storage of a backup key with a third party.

21
Q

ESP (Encapsulating Security Protocol)

A

IPSec sub-protocol that enables encryption and authentication of the header and payload of a data packet.

22
Q

evil twin

A

A wireless access point that deceives users into believing that it is a legitimate network access point.

23
Q

execution control

A

The process of determining what additional software may be installed on a client or server beyond its baseline to prevent the use of unauthorized software.

24
Q

exploitation framework

A

Suite of tools designed to automate delivery of exploits against common software and firmware vulnerabilities.

25
extranet
A private network that provides some access to outside parties, particularly vendors, partners, and select customers.
26
failover
A technique that ensures a redundant component, device, or application can quickly and efficiently take over the functionality of an asset that has failed.
27
fake telemetry
Deception strategy that returns spoofed data in response to network probes.
28
false negative
In security scanning, a case that is not reported when it should be.
29
false positive
In security scanning, a case that is reported when it should not be.
30
FAR (false acceptance rate)
Biometric assessment metric that measures the number of unauthorized users who are mistakenly allowed access.
31
Faraday cage
A wire mesh container that blocks external electromagnetic fields from entering into the container.
32
FC (Fibre Channel)
High speed network communications protocol used to implement SANs.
33
FDE (full disk encryption)
Encryption of all data on a disk (including system files, temporary files, and the pagefile) can be accomplished via a supported OS, third-party software, or at the controller level by the disk device itself.
34
federation
A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.
35
FIM (file integrity monitoring)
A type of software that reviews system files to ensure that they have not been tampered with.
36
fingerprint scanner
Biometric authentication device that can produce a template signature of a user's fingerprint then subsequently compare the template to the digit submitted for authentication.
37
first responder
The first experienced person or team to arrive at the scene of an incident.
38
fog computing
Provisioning processing resource between the network edge of IoT devices and the data center to reduce latency.
39
FPGA (field programmable gate array)
A processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture.
40
FRR (false rejection rate)
Biometric assessment metric that measures the number of valid subjects who are denied access.
41
FTK (Forensic Toolkit)
A commercial digital forensics investigation management and utilities suite, published by AccessData.
42
FTPS
A type of FTP using TLS for confidentiality.
43
full backup
A backup type in which all selected files, regardless of prior state, are backed up. full tunnel VPN configuration where all traffic is routed via the VPN gateway.