Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] eavesdropping ECC (Elliptic Curve Cryptosystem) economic feasibility studies EDI (electronic data interchange) 2nd 3rd EDI interfaces EDI translators educational background, self-assessment 2nd EER (Equal Error Rate) EFT (electronic funds transfer) electrical power failures 2nd electromagnetic interference (EMI) 2nd electronic data interchange (EDI) 2nd 3rd electronic funds transfer (EFT) electronic vaulting 2nd Elliptic Curve Cryptosystem (ECC) emergency action teams emergency change-management 2nd emergency operations teams emergency-management teams EMI electromagnetic interference) 2nd employee contracts encapsulation (data) 2nd encryption 2nd 3rd AES (Advanced Encryption Standard) algorithms asymmetric encryption 2nd 3rd Certificate Authorities (CAs) 2nd cryptography DES (Data Encryption Standard) digital certificates 2nd nonrepudiation private keys public key infrastructure (PKI) 2nd 3rd public keys 2nd 3rd symmetric encryption 2nd symmetric keys 2nd environmental security 2nd 3rd 4th 5th electromagnetic interference (EMI) 2nd fire-detection systems 2nd fire-suppression systems 2nd 3rd power failures 2nd Equal Error Rate (EER) ergonomics Ethernet 2nd ethics ISACA Code of Professional Ethics 2nd 3rd 4th evacuation planning 2nd 3rd evaluating IS management practices 2nd 3rd IS organization and structure 2nd 3rd 4th 5th outsourcing 2nd 3rd 4th 5th strategy development, deployment, and maintenance 2nd evidence obtaining 2nd 3rd preserving 2nd 3rd exam prep questions chapter 3 (technical infrastructure) 2nd 3rd 4th 5th 6th disaster recovery and business continuity 2nd 3rd 4th exam readiness 2nd exam. [See CISA exam] existence check s 2nd exit interviews experience, self-assessment 2nd extranets 2nd |