E


EAP (Extensible Authentication Protocol)

A remote access control protocol that implements various authentication mechanisms including MD5, S/Key, generic token cards, and digital certificates. Often used in wireless networks.

ECB (Electronic Code Book)

One of four operating modes for DES (see also CBC, CFB, DES, and OFB). Operates on 64-bit blocks of plaintext independently and produces 64-bit blocks of ciphertext. The native mode for DES operation. See also DES.

EES (Escrowed Encryption Standard)

Divides a secret key into two parts and places those two parts into escrow with two separate, trusted organizations. Published by NIST in FIPS PUB 185 (1994). See also NIST.

EMI (Electromagnetic Interference)

Electrical noise generated by the different charges between the three electrical wires (hot, neutral, and ground) and can be common-mode noise (caused by hot and ground) or traverse-mode noise (caused by hot and neutral).

Encryption

The process of transforming plaintext into ciphertext.

End-to-end encryption

Packets are encrypted once at the original encryption source and then decrypted only at the final decryption destination.

Enticement

Luring someone toward certain evidence after that individual has already committed a crime.

Entrapment

Encouraging someone to commit a crime that the individual may have had no intention of committing.

ESP (Encapsulating Security Payload)

In IPSec, provides confidentiality (encryption) and limited authentication. See also IPSec.

Espionage

The practice of spying or using spies to obtain proprietary or confidential information.

Ethernet

A common bus-topology network transport protocol.

Ethics

Professional principles and duties that guide decisions and behavior.

Evidence life cycle

The various phases of evidence from its initial discovery to its final disposition. The evidence life cycle has the following five stages: collection and identification; analysis; storage, preservation, and transportation; presentation in court; and return to victim (owner).

Exigent circumstances

If probable cause exists and the destruction of evidence is imminent, property or persons may be searched and/or evidence may be seized without a search warrant.

Expert systems

A type of artificial intelligence system based on an inference engine and knowledge base.

Extranet

An intranet that has been extended to include external parties such as customers, partners, and suppliers. See also Intranet.




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net