Security + E Flashcards
(10 cards)
EAP (Extensible Authentication Protocol):
EAP is an authentication framework that defines how authentication information is exchanged during a network connection. It is often used in wireless networks and point-to-point connections.
ECB (Electronic Code Book): ECB is a mode of operation for symmetric key block ciphers
where each block of plaintext is encrypted independently using the same key. This simplicity makes it vulnerable to attacks that exploit repeated plaintext patterns
ECC (Elliptic Curve Cryptography):
ECC is a public-key cryptography algorithm based on the algebraic structure of elliptic curves over finite fields. It offers stronger security with smaller key sizes compared to traditional methods like RSA.
ECDHE (Elliptic Curve Diffie-Hellman Ephemeral): ECDHE is a key exchange algorithm based on elliptic curve cryptography
allowing two parties to establish a shared secret over an insecure channel. The “ephemeral” aspect means the keys used are unique to each session
ECDSA (Elliptic Curve Digital Signature Algorithm): ECDSA is a digital signature algorithm that leverages elliptic curve cryptography to create digital signatures. It’s used to verify the authenticity and integrity of digital messages and is commonly used in applications like secure messaging
ECDSA is a digital signature algorithm that leverages elliptic curve cryptography to create digital signatures. It’s used to verify the authenticity and integrity of digital messages and is commonly used in applications like secure messaging.cryptocurrencies
EDR (Endpoint Detection and Response):
EDR is a cybersecurity solution that focuses on detecting and investigating malicious activities on endpoints like computers and servers. EDR tools gather data from endpoints, analyze it for suspicious patterns, and provide response capabilities to contain and remediate threats.
EFS (Encrypted File System): EFS provides encryption for files and directories on NTFS file system volumes
offering an additional layer of security beyond access controls. It uses a public-key system to encrypt individual files.
ERP (Enterprise Resource Planning): ERP is a type of software used by organizations to manage their core business processes
ERP is a type of software used by organizations to manage their core business processes, such as accounting, procurement, project management, and supply chain operations. ERP systems integrate these functions into a single system, providing a centralized data repository and real-time insights.
ESN (Electronic Serial Number):
ESN is a unique identification number assigned to mobile devices, particularly CDMA phones. It’s used for identification and authentication purposes and is programmed into the device during manufacturing
ESP (Encapsulating Security Payload):
ESP is a protocol within the IPsec suite that encrypts and authenticates data packets exchanged between devices using a VPN. It provides confidentiality and optional authentication services, operating in either Transport Mode (encrypting data payload) or Tunnel Mode (encrypting the entire packet).