CISSP For Dummies
- EAP (Extensible Authentication Protocol)
-
A remote access control protocol that implements various authentication mechanisms including MD5, S/Key, generic token cards, and digital certificates. Often used in wireless networks.
- ECB (Electronic Code Book)
-
One of four operating modes for DES (see also CBC, CFB, DES, and OFB). Operates on 64-bit blocks of plaintext independently and produces 64-bit blocks of ciphertext. The native mode for DES operation. See also DES.
- EES (Escrowed Encryption Standard)
-
Divides a secret key into two parts and places those two parts into escrow with two separate, trusted organizations. Published by NIST in FIPS PUB 185 (1994). See also NIST.
- EMI (Electromagnetic Interference)
-
Electrical noise generated by the different charges between the three electrical wires (hot, neutral, and ground) and can be common-mode noise (caused by hot and ground) or traverse-mode noise (caused by hot and neutral).
- Encryption
-
The process of transforming plaintext into ciphertext.
- End-to-end encryption
-
Packets are encrypted once at the original encryption source and then decrypted only at the final decryption destination.
- Enticement
-
Luring someone toward certain evidence after that individual has already committed a crime.
- Entrapment
-
Encouraging someone to commit a crime that the individual may have had no intention of committing.
- ESP (Encapsulating Security Payload)
-
In IPSec, provides confidentiality (encryption) and limited authentication. See also IPSec.
- Espionage
-
The practice of spying or using spies to obtain proprietary or confidential information.
- Ethernet
-
A common bus-topology network transport protocol.
- Ethics
-
Professional principles and duties that guide decisions and behavior.
- Evidence life cycle
-
The various phases of evidence from its initial discovery to its final disposition. The evidence life cycle has the following five stages: collection and identification; analysis; storage, preservation, and transportation; presentation in court; and return to victim (owner).
- Exigent circumstances
-
If probable cause exists and the destruction of evidence is imminent, property or persons may be searched and/or evidence may be seized without a search warrant.
- Expert systems
-
A type of artificial intelligence system based on an inference engine and knowledge base.
- Extranet
-
An intranet that has been extended to include external parties such as customers, partners, and suppliers. See also Intranet.
Категории